Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An integrated circuit for defending hardware Trojan horse and an encryption method thereof

A technology of integrated circuit and encryption method, which is applied in the direction of logic circuit with logic function, internal/peripheral computer component protection, platform integrity maintenance, etc., which can solve excessive timing, area and power consumption overhead, and protection measures are easy to be attacked The problem of cracking by the attacker and sufficient protection of function output can achieve the effect of good encryption effect, resistance to hardware Trojans, and high security.

Active Publication Date: 2019-05-17
XIDIAN UNIV
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the obfuscation effect of the first method depends largely on the number and location of triggers, so it cannot guarantee sufficient protection for internal nodes and function outputs, and there have been many researches on obfuscation and logic encryption. This method is easy to be cracked by the attacker because it does not provide enough protection for the correct key; the second method needs to insert enough key gates into the original circuit in order to ensure the quality of logical encryption. , which in turn introduces excessive timing, area and power consumption overhead, and for the existing attack methods to crack the key, this method does not take sufficient protection measures, so it is easy to be cracked by the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An integrated circuit for defending hardware Trojan horse and an encryption method thereof
  • An integrated circuit for defending hardware Trojan horse and an encryption method thereof
  • An integrated circuit for defending hardware Trojan horse and an encryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0047] See figure 1 with figure 2 , figure 1 It is a schematic flowchart of an encryption method for an integrated circuit for defending against hardware Trojan horses provided by an embodiment of the present invention, figure 2 It is a schematic flowchart of another encryption method for an integrated circuit for defending against hardware Trojan horses provided by an embodiment of the present invention. An integrated circuit encryption method for defending against hardware Trojan horses provided by an embodiment of the present invention includes:

[0048] Step 1, using the logic encryption circuit to obtain the first integrated circuit;

[0049] 1.1. Set the three parameters of initial temperature, cut-off temperature and annealing speed;

[0050] In this embodiment, when using the algorit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an integrated circuit for defending hardware Trojan horse and an encryption method thereof. The method comprises the following steps of acquiring a first integrated circuit byusing a logic encryption circuit; obtaining a second integrated circuit according to the Hamming distance of the first integrated circuit; obtaining a third integrated circuit according to the Hamming distance of the second integrated circuit; obtaining a third integrated circuit according to the Hamming distance of the first integrated circuit and the Hamming distance of the second integrated circuit; and obtaining a fourth integrated circuit according to the number of iterations of the third integrated circuit and a predetermined number of iterations. According to the encryption method, enough protection can be provided for the internal nodes and function output of an original circuit at the same time, threats of hardware Trojan, infringement, piracy and other attack behaviors are effectively resisted, and the time sequence, the area and the power consumption cost are low.

Description

technical field [0001] The invention belongs to the technical field of integrated circuits, and in particular relates to an integrated circuit for defending hardware Trojans and an encryption method thereof. Background technique [0002] An integrated circuit (integrated circuit) is a tiny electronic device or component. Integrated circuits have the advantages of small size, light weight, fewer lead wires and soldering points, long life, high reliability, and good performance. At the same time, their cost is low and they are convenient for mass production. It is not only widely used in industrial and civil electronic equipment (such as radio recorders, televisions, computers), etc., but also in military affairs, communications, remote control, etc. [0003] When the integrated circuit industry just started, due to the small design scale, relatively simple process technology, long design and manufacturing cycle, and low cost, integrated circuit manufacturers were able to rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76G06F21/56G06F21/72H03K19/20
Inventor 史江义白永晨陈琦璇员维维
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products