Security IP: Active Shield

Secure-IC provide Chip Security Protection IP Cores: Cryptographic algorithm IP such as AES, DES, 3-DES, ECC, RSA, SM2, SM3, SM4, SHA1, SHA2, SHA3, HMAC, countermeasure IP such as TRNG, CTR-DRBG RNG, Digital Sensor, Active Shield, PUF, Smart Monitor, Scrambled Bus, Memory Ciphering, Cyber CPU, Secure Clock, Secure Book, Secure Monitor, Secure JTAG, etc.

Security IP Active Shield:

Active Protection against Intrusive Attacks on ASIC, Anti Intrusive  Hardware Modification.


Product Details

Secure-IC Security IP Cores: Active Shield

Active Protection against Intrusive Attacks on ASIC, Anti Intrusive  Hardware Modification.
1. PROBLEM SOLVED
Attacks against digital circuits can be performed by directly tampering with the device’s internal structure. These attacks are intrusive, and regroup attempts to directly probe or force signals, remove, add or modify features on the chip (metal routing, transistors).
Secure-IC’s Active Shield technology is designed to deter such intrusive attacks by placing a mesh over the sensitive parts of the circuit and actively monitoring the mesh’s integrity. This counter-measure protects the circuit’s features such as metal routing and transistors that are beneath the mesh from undetected access or modification through the front-side, including:
• Wire micro-probing to read or force an equipotential
• Wire cutting (e.g. alarms, entropy source disconnection from a true random number generator…)
• Wire re-routing
• Burnt fuses opening
• ROM Altering

In order to further deter intrusive attacks, the mesh is actively monitored using random cryptographicallygenerated patterns to detect integrity violations. By using this technology, modifying and rerouting the mesh becomes very costly as the attacker has to reroute many wires to avoid detection. In addition, the data travelling through the shield mesh cannot be predicted by the attacker, because it is output by a cryptographic block cipher.

2. GLOBAL OVERVIEW
Active Shield technology relies on several submodules:
• A mesh created using a metal layer for wire routing
• Drivers and receivers used for electrical connection with the mesh
• A cryptographic-grade tamper detection module for monitoring the mesh integrity

Active Shield Overview.png

About Secure-IC Security IP Cores

Secure-IC provide various security IP cores as following list (keep updating).

AESEncryption, against Side-Channel Attacks
DES / 3-DESEncryption, against Side-Channel Attacks
RSAEncryption, against Side-Channel Attacks
ECCEncryption, against Side-Channel Attacks
HASH (SHA-1/MD-5)Encryption, against Side-Channel Attacks
SM2Encryption, against Side-Channel Attacks
SM3Encryption, against Side-Channel Attacks
SM4Encryption, against Side-Channel Attacks
TRNGTrue Random Number Generator,Digital,against Harmonic EM Attacks
PUFDigital, Anti Cloning/Counterfeiting,100% Unique, Random and Steady ID Generation
Digital Sensor Anti Fault Injection Attacks, All-in-one Fault Injection Detector, Entirely Digital
Active ShieldActive Protection against Intrusive Attacks on ASIC, Anti Intrusive Hardware Modification.
Scrambled BUSEncrypted Information to Prevent Probing on BUS, Anti Eavesdroping
Memory CipheringMemory Protection Against Reverse Engineering and Tampering
Secure ClockAnti Synchronization to prevent efficient SCA and FIA
Secure JTAGAuthentication System to Secure the debugging channel on chip, Anti JTAG Violation
Secure BootMaximum security-enabling root-on-trust, Anti Firmware Tampering
Secure MonitorMaximum security-enabling monitoring, Security policy bypass
CyberCPU CPUCPU-agnostic Cyber Attack Sensor

Request a Quote

Current Products:Security IP: Active Shield

  • I have carefully read and agree toPrivacy Statement

  • I agree to receive the Newsletters from Elbe Technologies

  • Submit