Suggestions on ic decryption

Theoretically, as long as there is enough investment and time, any single chip microcomputer can be broken by attackers. This is the basic principle that system designers should always keep in mind. Therefore, as a design engineer of electronic products, it is very necessary to know the latest technology of single-chip attack and know yourself, so as to effectively prevent the products that you have spent a lot of money and time painstakingly designing from being counterfeited overnight. According to the decryption practice in Hu Sheng, we put forward the following suggestions: (1) Before choosing the encryption chip, we should fully investigate and understand the new development of chip decryption technology, including which single-chip computers have been confirmed to be able to crack. Try not to choose a chip that can be cracked or a chip of the same series and model, and choose a single chip microcomputer with new technology, new structure and short time to market. For example, if ATMEGA88PA can be used, the current domestic cracking cost is about 6K, and other chips that are relatively difficult to decrypt are ST 12 series and dsPIC30F series. Others can also be encrypted by CPLD, so the decryption cost is very high, and the general CPLD decryption also needs about 1 10,000. (2) Try not to choose MCS-51series single chip microcomputer, because this kind of single chip microcomputer is the most popular and thoroughly researched in China. (3) The originators of products generally have the characteristics of large output, so it is more difficult for counterfeiters to purchase with relatively uncommon and unpopular single-chip computers. Some unusual single-chip computers, such as Attiny 23 13, AT89C5 1RD2, AT89C5 1RC2, Motorola single-chip computers and other chips that are difficult to decrypt, are currently being developed in China. (4) If the design cost allows, smart card chips with hardware self-destruction function should be selected to effectively deal with physical attacks; In addition, when programming, adding time to the timing function, such as 1 year, all functions will automatically stop running, which will increase the cost of the cracker. (5) If conditions permit, two different types of single-chip computers can be used for mutual backup and verification, which will increase the cracking cost. (6) Grind off the chip model and other information or reprint other models to confuse the real with the fake (note that the LOGO on the reverse side should also be erased. For many chips, the decryptor can judge the model from the reverse side, such as 5 1, Winbond, MDT and so on. ). (7) The undisclosed and unused flag bits or units of single chip microcomputer can be used as software flag bits. (8) Use A5 instruction in MCS-5 1 for encryption. In fact, all the materials in the world, including English materials, do not speak this instruction. In fact, this instruction is a good encryption instruction. The function of A5 is to add a double-byte or three-byte operation code after A5 in the encryption method of double-byte empty operation instruction, because all disassembly software will not disassemble A5 instruction, which will lead to the normal program being disassembled. If there is no problem with the program execution, the plagiarist can't change your source program. (9) You should write down the development time of your famous company and the statement that imitation will be investigated for legal protection in the program area; In addition, when you write your name, it can be random, that is to say, with some algorithm, your name is different under different external conditions, such as, etc. It is difficult to disassemble and modify. (10) burn some internal pins with advanced programmers, or burn gold wires with self-made equipment, which is almost impossible to decrypt in China at present. Even if it is decrypted, it will cost tens of thousands of dollars and require multiple master films. (1 1) The whole circuit board is sealed with confidential silica gel (epoxy potting compound), and there are many useless pads on the PCB. Silica gel can also be doped with some useless components, and try to erase the electronic components around MCU. (12) For SyncMos and Winbond MCU, the files to be burned will be converted into hexadecimal files, so that the program space burned into the chip will be automatically increased by 00. If you are used to the BIN file, you can also use the programmer to change the FF of the blank area to 00, so that the general decryptor can't find the space in the chip and can't perform subsequent decryption operations. (13) Compared with horizontal encryption, for example, 18F4620 has an internal phase-locked loop, which can generate a high-precision clock by using RC oscillation and erase the internal data of 18F4620 when it is powered on, so the decrypted file cannot be used at all. (14) As a representative of Japanese chips, NEC series single-chip computers have designed enough protection measures to ensure the safety of their program codes. At the same time, this series of single chip microcomputer has no program reading function, so it is impossible to read the program with a programmer. (Note: When programming a chip with a programmer, the verification function is not to read out the program for verification, but the programmer sends data to the chip, and the core of the chip independently compares with the data in the storage area, and then returns the comparison result to the programmer). Of course, it is impossible to fundamentally prevent the single chip microcomputer from being decrypted. With the continuous development of encryption technology and decryption technology, now no matter what kind of single chip microcomputer, as long as someone is willing to pay, it can basically be manufactured, just a matter of cost and cycle length. Programmers can also protect their own development through legal channels (such as patents).