2018
DOI: 10.48550/arxiv.1801.04961
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits

Rajit Karmakar,
Santanu Chatopadhyay,
Rohit Kapur

Abstract: Logic Encryption is one of the most popular hardware security techniques which can prevent IP piracy and illegal IC overproduction. It introduces obfuscation by inserting some extra hardware into a design to hide its functionality from unauthorized users. Correct functionality of an encrypted design depends upon the application of correct keys, shared only with the authorized users. In the recent past, extensive efforts have been devoted in extracting the secret key of an encrypted design. At the same time, se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(25 citation statements)
references
References 28 publications
0
25
0
Order By: Relevance
“…However, these techniques are susceptible to various structural and functional attacks [18,21,32,33]. 2) Scan locking [34,35] techniques obfuscate the scan data, limiting the controllability and observability of internal nets. Nevertheless, modeling attacks [16,36] have been successful in circumventing scan locking techniques.…”
Section: Background and Related Workmentioning
confidence: 99%
“…However, these techniques are susceptible to various structural and functional attacks [18,21,32,33]. 2) Scan locking [34,35] techniques obfuscate the scan data, limiting the controllability and observability of internal nets. Nevertheless, modeling attacks [16,36] have been successful in circumventing scan locking techniques.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Dynamic Encrypt Flip-Flop (EFF-Dyn) [13] combines scan locking approach from [10] and a PRNG, to introduce dynamicity in the defense. During functional mode or the capture operation in test mode (scan enable (SE) signal is low), the secret scan locking key that is stored in the Tamper-Proof Memory (TPM) controls the key gates.…”
Section: A Case Studymentioning
confidence: 99%
“…Recently, XOR/MUX based scan obfuscation techniques have been proposed [10], [11], [12], [13] to obfuscate the scan data via XOR/MUX operations based on a secret key through key gates inserted between the scan flops. In [10], a static key is used to obfuscate the scan chain content during scan in and out of patterns, effectively hindering unauthorized scan access. However, this defense was also recently broken by ScanSAT attack [14].…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, the adversary can target sequential circuits using the SAT attack. Hence, few recent studies investigated the possibility of restricting the scan chain using scan chain locking/blocking [9]- [11]. Also, considering that the access to the scan chain is restricted/locked, several studies investigated the possibility of applying the logic locking to the whole sequential circuits [14], [15], particularly FSMs [14]- [19].…”
Section: Introductionmentioning
confidence: 99%
“…In case of FSM locking [16]- [18], [21], a new attack, without oracle access, denoted as 2-stage attacks on FSM (2-stage) was formulated [14], [19]. Also, in case of sequential (datapath) or scan chain locking [9]- [11], [14], [15], a new breed of SAT-based attacks, referred as unrolling-based SAT attack (UB-SAT) as well as SAT attacks integrated with bounded-model-checking (BMC) was formulated [22]- [24], challenging the validity of these solutions.…”
Section: Introductionmentioning
confidence: 99%