IC Protection from IP and IC Piracy using AES Logic Encryption
Abstract
Most of the IC’s are implemented by means of IP piracy and IC piracy. Usage of hardware intellectual property by the third party is known as IP piracy and manufacturing the IC without the knowledge of IC owner is known as IC piracy. The objective of this paper is to avoid this IP piracy and IC piracy. Various methods to avoid this IP and IC piracy are exist in the literature such as logic obfuscation, logic encryption, split manufacturing, IC Camouflaging, and Trojan Activation. This paper deals with the logic encryption method to avoid the IP and IC piracy. Logic encryption is done by means of introducing the key gates where one of the input given to the key gates is called as key input. In our proposed paper, AES encrypted key is given to the key circuit.
Keywords
Full Text:
PDFReferences
Jeyavijayan Rajendran, Ozgur Sinanoglu, “Regaining Trust in VLSI Design: Design-for-Trust Techniques”, Proceedings of the IEEE, Vol. 102, No. 8, August 2014
Rajat Subhra Chakraborty, and Swarup Bhunia, “HARPOON: An Obfuscation-based Soc Design Methodology For Hardware Protection”, IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, Vol. 28, No. 10, October 2009
Masoud Rostami, Farinaz Koushanfar, Ramesh Karri, “A Primer on Hardware Security: Models, Methods, and Metrics”, IEEE, Vol. 102, No. 8, August 2014
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.