Open Access Open Access  Restricted Access Subscription or Fee Access

IC Protection from IP and IC Piracy using AES Logic Encryption

R. Sivarajan, D. Ezhilarasi, D. Gajalakshmi, V. Kalpana, J. Logeswari

Abstract


Most of the IC’s are implemented by means of IP piracy and IC piracy. Usage of hardware intellectual property by the third party is known as IP piracy and manufacturing the IC without the knowledge of IC owner is known as IC piracy. The objective of this paper is to avoid this IP piracy and IC piracy. Various methods to avoid this IP and IC piracy are exist in the literature such as logic obfuscation, logic encryption, split manufacturing, IC Camouflaging, and Trojan Activation. This paper deals with the logic encryption method to avoid the IP and IC piracy. Logic encryption is done by means of introducing the key gates where one of the input given to the key gates is called as key input. In our proposed paper, AES encrypted key is given to the key circuit.


Keywords


IP Piracy, IC Piracy, AES, Encryption, Key

Full Text:

PDF

References


Jeyavijayan Rajendran, Ozgur Sinanoglu, “Regaining Trust in VLSI Design: Design-for-Trust Techniques”, Proceedings of the IEEE, Vol. 102, No. 8, August 2014

Rajat Subhra Chakraborty, and Swarup Bhunia, “HARPOON: An Obfuscation-based Soc Design Methodology For Hardware Protection”, IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, Vol. 28, No. 10, October 2009

Masoud Rostami, Farinaz Koushanfar, Ramesh Karri, “A Primer on Hardware Security: Models, Methods, and Metrics”, IEEE, Vol. 102, No. 8, August 2014


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.