Font Size: a A A

Design,Implementation And Verification Of Security Chip Based On China Standard Cryptographic Algorithm

Posted on:2020-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:J C YangFull Text:PDF
GTID:2428330596995420Subject:Control engineering
Abstract/Summary:PDF Full Text Request
With the development of information and communication technology,our life have entered an era of interconnection.People enjoy the convenience brought by massive information,but also bear the risk of personal information being stolen.At the same time,the IC industry is also experiencing a rapid development process.In 1965,Gordon Moore,one of Intel's founders,proposed Moore's Law.In the following years,the IC industry followed Moore 's law and developed rapidly.At the present time,integrated circuits have become the foundation of industry intellectualization.In this paper,a security chip based on China standard cryptographic algorithm for IoT equipment is proposed,which combines the two hotspots,information security and integrated circuits.This design aims at the optimization of the previous security chip.China standard cryptographic algorithm is a series of cryptographic standards formulated and promulgated by the State Cryptography Administration Office.China standard cryptographic algorithm SM2,SM3,SM4 are supported in this chip.For adapting to more application scenarios,international standard cryptographic algorithms AES and SHA are also supported.Digital-analog hybrid SoC design flow and advanced EDA tools are adopted for the design,which integrates 32-bit low-power CPU,AMBA bus,PUF module,analog module,true random number generator and abundant peripheral interfaces.The process deviation occurs in the production process inevitably,which can be utilized for generating the uniqueness of PUF.Therefore,PUF is applied to identity recognition due to its uniqueness as the fingerprint of chip.The LDO module and the OSC module are included in analog module.LDO mainly manages the power supply of the chip,while OSC is the clock source of the chip.The design difficulties of the chip mainly come from the digital-analog hybrid design and backend design.As the chip is embedded to IoT equipment,high requirement of its area is posed.The characteristic of analog circuit is different from that of digital circuit.It is necessary to seriously consider the compatibility of circuit to ensure that both circuits can work properly.Because of the particularity of the analog module structure,some adjustments need to be made in the digital circuit when integrating the module.Aiming at technical problems in the design,a design scheme will be presented based on IC design tools in the industry in this paper.To ensure the correctness in data transmission and logical function of the chip,timing verification and physical verification are needed before tapeout.The chip is packaged in LQFP48 with a working frequency of 36 MHz and a working current of 5?10 mA.The speed in SM2 encryption is 35.6 Mbps,and 67.5 Mbps in SM2 decryption.The signature speed of SM2 is 71 times per second and the verification speed is 37 times per second The hash throughput of SM3 is 5.9?17.5 Mbps.The encryption and decryption speed of SM4 are both 12.36 Mbps.In international standard module,the encryption and decryption speed of AES are both 18.43 Mbps,and the hash throughput of SHA is 6.6 Mbps.The PUF has an advanced performance,being 50%better than the tradition one.Obviously,the requirements about the chip's security performance have been met.
Keywords/Search Tags:Security Chip, Digital-analog Hybrid Design, China Standard Cryptographic Algorithm, Backend Design, Chip Verification
PDF Full Text Request
Related items