Font Size: a A A

Design And Implementation Of Application Specific Secure Chip Based On SoC

Posted on:2010-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:S J WenFull Text:PDF
GTID:2178360278980838Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of information technology, establishing the secure common information platform, which processing the characteristics of low costs, high efficiency and easy using, is significant for the information security application sensitive areas of the country, such as finance and military affairs. It's also useful for the company and the individual. This article, based on the secure requests and function criterions of the secure chip, studies the architecture design, self security measurement, trust delivery model establishment and attack defence of the secure chip, then designs and implements one application specific secure chip-ETISC_SoC. The main jobs and research results are listed as follows:1. According to the TOE Development Model and the Guidance of the TOE's Secure Requests and Function Criterions of CC, by analyzing the application environments of the secure chip, combining with the existed secure chip's architecture and the developing trends of the smart card, we present the secure requests and function criterions of the ETISC_SoC.2. Aimed at the secure requests and function criterions, combining with the TPM design principals and the cryptographic chip ETI_SoC, we establish the design model of the secure chip, and accomplish the design's software and hardware partition.3. Instructed by the design model, we complete the hardware structure's design and implementation, which includes presenting the memory management mechanism to support that the code can be downloaded by the user, logically separated between the different storage areas, dynamically configure the internal memories; integrating the SHA1 IP core and TDES IP core to satisfy the multi-functions trend of the secure chip, adopting the IP bridge technology to optimize the Function Module, effectively improving the use of the internal resources; designing and implementing the Secure Logic Module to defend the physical attacks of the chip.4. Adopting the software-hardware co-design measure to establishing the secure system structure of the secure chip, presenting the method of the chip's self security measurement and trust delivery model, as well as the state transfer flow and restrictions, designing and implementing the corresponding mechanisms to protect the security of the chip's transportation, booting up, configuration, calling for functions and so on. Function simulation and system testing indicate that ETISC_SoC can satisfy the fundamental secure attributes. In the precondition of the chip's flexibility, the secure system structure protects the chip's security.
Keywords/Search Tags:Application specific Secure Chip based on SoC, System Design Model, Hardware Architecture, Secure Mechanisms
PDF Full Text Request
Related items