成果報告書 2019年3月

本文へジャンプ

成果報告書詳細
管理番号20180000000410
タイトル*平成29年度中間年報 戦略的イノベーション創造プログラム(SIP)/重要インフラ等におけるサイバーセキュリティの確保/(a4)IoT向けセキュリティ確認技術(IoT向けセキュリティ確認技術の研究開発)
公開日2019/3/7
報告書年度2017 - 2017
委託先名電子商取引安全技術研究組合 ルネサスエレクトロニクス株式会社
プロジェクト番号P15011
部署名IoT推進部
和文要約
英文要約Title : Strategic Innovation Promotion Program (SIP) / Cyber-Security for Critical Infrastructures / (a4) Security Verification Technologies for IoT Systems (FY2015-2017)
FY2017 Annual Report

1. Development of Secure Cryptographic Unit (SCU) for IoT System Equipment
a. Cryptographic Module
- Developed engine IP of elliptic curve public key cryptographic algorithm (ECC) to be installed in SCU, realizing 13k gates at 160μW.
- Reached the signature generation time of 30μs as a high-speed ECC engine IP.
- Laminated the digital signature generation chip with the backside wiring interposer and confirmed the basic operation of the 2.5D prototype device.
b. Tamper Resistant Technology
- Applied the tip mounting in the cryptographic module and evaluated the tamper resistance performance.
- Conducted vulnerability assessment and tamper resistance verification tests.
c. Platform
- Designed the SCU prototype chip KM12 and KM13 for implementation of cryptographic algorithm functions.
- Designed to make ECC engine IPs on one chip and verified the T/O.
- Summarized the API specification for the software gate (SWG) corresponding to the model system (STEP1) and released the complete version.
d. Marketing
- Agreed on the proposal for intellectual property proceedings among the research institutes and started to intellectualize the research achievements.
- Evaluated the ST in compliance with the certified PP based on ISO/IEC 15408.

2. Development of Model Systems Using SCU
- Created a demo scenario to show the effectiveness of the security function by SCU.
- Built a surveillance camera system, as one of application demonstration examples, and verified the influence of spoofing and tampering with video data.

3. Development of Countermeasures Against Hardware Trojans
- Examined the countermeasure technology to be used, specifically focusing on the threat by inserting a hardware trojan into the semiconductor chip after manufacture.
- Selected a suitable detection method by constructing a virtual prototype.
ダウンロード成果報告書データベース(ユーザ登録必須)から、ダウンロードしてください。

▲トップに戻る