Education, Science, Technology, Innovation and Life
Open Access
Sign In

Research on the information security detection technology about encryption chips in automotive environment

Download as PDF

DOI: 10.23977/jeis.2022.070201 | Downloads: 31 | Views: 928

Author(s)

Ruiqing Zhai 1, Xuebin Shao 1, Rui Zhao 1

Affiliation(s)

1 CATARC Software Testing (Tianjin)Co.,Ltd., Tianjin, 300000, China

Corresponding Author

Ruiqing Zhai

ABSTRACT

With the continuous development of intelligent and connected automotive technology, information security issues have become more and more frequent, including remote attacks, network security, and physical manipulation. The automotive security chip is the most basic security foundation for the information security of the intelligent networked vehicle, and its security and encryption vulnerabilities are the most concerned points for the defenders. Security encryption chip testing technology has become increasingly mature through many years, especially the recent years. The encryption chip side channel attack and fault injection attack methods have been widely concerned, which has accelerated the development of chip encryption technology. The essential difference between automotive security chips and general security chips lies in the different using environments and application scenarios, which makes differences in testing methods. This paper mainly expounds the development of security chip testing technology and the main differences between automotive security chips and general security chips. This paper focuses on the possible development trend of injection attacks applied to automotive chips, which provides a reference for the testing technology and protection methods.

KEYWORDS

Automotive security chips, security scenarios, fault injection, security advice

CITE THIS PAPER

Ruiqing Zhai, Xuebin Shao, Rui Zhao, Research on the information security detection technology about encryption chips in automotive environment. Journal of Electronics and Information Science (2022) Vol. 7: 1-7. DOI: http://dx.doi.org/10.23977/jeis.2022.070201.

REFERENCES

[1] Sandeep Krishnegowda.Secure Flash,Solutions to Security Issues in Connected Vehicles and Industrial Applications [J]. China integrated Circuit, 2021, 30(06): 45-49.
[2] Kocher F C. Timing attacks on implementations of Diffe-Hellman, RSA, DSS, and other systems [C]. Advances in Cryptology -CRYFTO'96.CRYFTO 19 96. Lecture Notes i n Comput er Science, 1996, 1978: 104-113.
[3] YU Sai. Side Channel Analysis and Implementation Based on Block Cipher Algorithm [D]. University of Electronic Science and Technology of China, 2019.
[4] QIAO Yifei.A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Engineering [D]. Huazhong University of Science & Technology, 2017. 
[5] A. Barenghi, G. M. Bertoni, L. Breveglieri, and G. Pelosi. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA [J]. Journal of Systems and Software, vol. 86, no.7, pp.1864-1878, 2013.
[6] R. A. C. Viera, P. Maurine, J. -M. Dutertre and R. Possamai Bastos. Simulation and Experimental Demonstration of the Importance of IR-Drops During Laser Fault Injection [C]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 6, pp. 1231-1244, June 2020.
[7] Dehbaoui A, Dutertre J M, Robisson B, et al. Electromagnetic transient faults injection on a hardware and a software implementations of AES [C]. 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos: IEEE Computer Society Press, 2012: 7-15. 
[8] WANG Xuecong. Research on 5G Internet of Vehicles Security Based on V2X HSM[J]. Information Security Research, 2020, 6(08): 705-709.
[9] ZHAI Teng,Gao Hongling,Guo Qingshuai.Chip hardware security risk analysis and prevention and control suggestions [J]. Industrial Technology Innovation, 2020, 07 (03): 18-23.
[10] WANG Qing, TU Chenyang, SHEN Jiahui. Design and Application of General Framework for Side Channel Attack [J]. Netinfo Security, 2017(5): 57-62.

Downloads: 6303
Visits: 248545

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.