Cracking method of integrated circuit encrypted circuit state machine

The invention belongs to the technical field of integrated circuits, and discloses a cracking method of an integrated circuit encrypted circuit state machine, which comprises the following steps of: 1, applying excitation to a netlist, and extracting information; 2, regarding a process of solving a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HUANG KAI, LIU ZHILI, WANG KE, JIN LINLI, JIANG XIAOWEN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator HUANG KAI
LIU ZHILI
WANG KE
JIN LINLI
JIANG XIAOWEN
description The invention belongs to the technical field of integrated circuits, and discloses a cracking method of an integrated circuit encrypted circuit state machine, which comprises the following steps of: 1, applying excitation to a netlist, and extracting information; 2, regarding a process of solving a secret key as a process of state machine reconstruction, and converting the problem into a constraint programming problem; and 3, if the number of the keys obtained by the CP-SAT solver is 1, the attack is ended, and a unique correct key is obtained, otherwise, Synopsys VC Formal SEQ Application is used for carrying out time sequence equivalence check, and wrong keys are further eliminated in combination with Oracles until the unique correct key or a plurality of equivalent keys are obtained. The attack duration mainly depends on the scale of the state machine and the inherent jump relation in the state machine, the attack time is short, and the efficiency is high. 本发明属于集成电路技术领域,公开了一种集成电路加密电路状态机的破解方法,包括步骤1:对网表施加激励,
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115879172A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115879172A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115879172A3</originalsourceid><addsrcrecordid>eNrjZHB1LkpMzs7MS1fITS3JyE9RyE9TyMwrSU0vSixJTVFIzixKLs0sUUjNSy6qLEAWKS4BKlDITUzOyMxL5WFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoamFuaWhuZGjsbEqAEAELczhw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Cracking method of integrated circuit encrypted circuit state machine</title><source>esp@cenet</source><creator>HUANG KAI ; LIU ZHILI ; WANG KE ; JIN LINLI ; JIANG XIAOWEN</creator><creatorcontrib>HUANG KAI ; LIU ZHILI ; WANG KE ; JIN LINLI ; JIANG XIAOWEN</creatorcontrib><description>The invention belongs to the technical field of integrated circuits, and discloses a cracking method of an integrated circuit encrypted circuit state machine, which comprises the following steps of: 1, applying excitation to a netlist, and extracting information; 2, regarding a process of solving a secret key as a process of state machine reconstruction, and converting the problem into a constraint programming problem; and 3, if the number of the keys obtained by the CP-SAT solver is 1, the attack is ended, and a unique correct key is obtained, otherwise, Synopsys VC Formal SEQ Application is used for carrying out time sequence equivalence check, and wrong keys are further eliminated in combination with Oracles until the unique correct key or a plurality of equivalent keys are obtained. The attack duration mainly depends on the scale of the state machine and the inherent jump relation in the state machine, the attack time is short, and the efficiency is high. 本发明属于集成电路技术领域,公开了一种集成电路加密电路状态机的破解方法,包括步骤1:对网表施加激励,</description><language>chi ; eng</language><subject>BASIC ELECTRONIC CIRCUITRY ; CALCULATING ; CODE CONVERSION IN GENERAL ; CODING ; COMPUTING ; COUNTING ; DECODING ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230331&amp;DB=EPODOC&amp;CC=CN&amp;NR=115879172A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230331&amp;DB=EPODOC&amp;CC=CN&amp;NR=115879172A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HUANG KAI</creatorcontrib><creatorcontrib>LIU ZHILI</creatorcontrib><creatorcontrib>WANG KE</creatorcontrib><creatorcontrib>JIN LINLI</creatorcontrib><creatorcontrib>JIANG XIAOWEN</creatorcontrib><title>Cracking method of integrated circuit encrypted circuit state machine</title><description>The invention belongs to the technical field of integrated circuits, and discloses a cracking method of an integrated circuit encrypted circuit state machine, which comprises the following steps of: 1, applying excitation to a netlist, and extracting information; 2, regarding a process of solving a secret key as a process of state machine reconstruction, and converting the problem into a constraint programming problem; and 3, if the number of the keys obtained by the CP-SAT solver is 1, the attack is ended, and a unique correct key is obtained, otherwise, Synopsys VC Formal SEQ Application is used for carrying out time sequence equivalence check, and wrong keys are further eliminated in combination with Oracles until the unique correct key or a plurality of equivalent keys are obtained. The attack duration mainly depends on the scale of the state machine and the inherent jump relation in the state machine, the attack time is short, and the efficiency is high. 本发明属于集成电路技术领域,公开了一种集成电路加密电路状态机的破解方法,包括步骤1:对网表施加激励,</description><subject>BASIC ELECTRONIC CIRCUITRY</subject><subject>CALCULATING</subject><subject>CODE CONVERSION IN GENERAL</subject><subject>CODING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DECODING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHB1LkpMzs7MS1fITS3JyE9RyE9TyMwrSU0vSixJTVFIzixKLs0sUUjNSy6qLEAWKS4BKlDITUzOyMxL5WFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoamFuaWhuZGjsbEqAEAELczhw</recordid><startdate>20230331</startdate><enddate>20230331</enddate><creator>HUANG KAI</creator><creator>LIU ZHILI</creator><creator>WANG KE</creator><creator>JIN LINLI</creator><creator>JIANG XIAOWEN</creator><scope>EVB</scope></search><sort><creationdate>20230331</creationdate><title>Cracking method of integrated circuit encrypted circuit state machine</title><author>HUANG KAI ; LIU ZHILI ; WANG KE ; JIN LINLI ; JIANG XIAOWEN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115879172A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>BASIC ELECTRONIC CIRCUITRY</topic><topic>CALCULATING</topic><topic>CODE CONVERSION IN GENERAL</topic><topic>CODING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DECODING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>HUANG KAI</creatorcontrib><creatorcontrib>LIU ZHILI</creatorcontrib><creatorcontrib>WANG KE</creatorcontrib><creatorcontrib>JIN LINLI</creatorcontrib><creatorcontrib>JIANG XIAOWEN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HUANG KAI</au><au>LIU ZHILI</au><au>WANG KE</au><au>JIN LINLI</au><au>JIANG XIAOWEN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Cracking method of integrated circuit encrypted circuit state machine</title><date>2023-03-31</date><risdate>2023</risdate><abstract>The invention belongs to the technical field of integrated circuits, and discloses a cracking method of an integrated circuit encrypted circuit state machine, which comprises the following steps of: 1, applying excitation to a netlist, and extracting information; 2, regarding a process of solving a secret key as a process of state machine reconstruction, and converting the problem into a constraint programming problem; and 3, if the number of the keys obtained by the CP-SAT solver is 1, the attack is ended, and a unique correct key is obtained, otherwise, Synopsys VC Formal SEQ Application is used for carrying out time sequence equivalence check, and wrong keys are further eliminated in combination with Oracles until the unique correct key or a plurality of equivalent keys are obtained. The attack duration mainly depends on the scale of the state machine and the inherent jump relation in the state machine, the attack time is short, and the efficiency is high. 本发明属于集成电路技术领域,公开了一种集成电路加密电路状态机的破解方法,包括步骤1:对网表施加激励,</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN115879172A
source esp@cenet
subjects BASIC ELECTRONIC CIRCUITRY
CALCULATING
CODE CONVERSION IN GENERAL
CODING
COMPUTING
COUNTING
DECODING
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
title Cracking method of integrated circuit encrypted circuit state machine
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T00%3A35%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HUANG%20KAI&rft.date=2023-03-31&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115879172A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true