Logic encryption defense method based on key gate position selection

A key gate and key technology, applied in encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc., can solve the problem of shortening the running time and the difficulty of keeping the key bits in the encryption scheme while resisting sensitization. and Gao Hanming distance and other issues, to achieve the effect of shortening running time, saving running time, and short running time

Active Publication Date: 2020-07-28
PEKING UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of chip design, a logical encryption defense method based on key gate position selection is provided to solve the problem that the encryption scheme of the IP core in the current design stage is difficult to keep the key bit anti-sensitization and high Hamm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Logic encryption defense method based on key gate position selection
  • Logic encryption defense method based on key gate position selection
  • Logic encryption defense method based on key gate position selection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The logical encryption defense method based on key gate position selection provided by the present invention will be described in detail below in conjunction with the accompanying drawings, but it does not constitute a limitation to the present invention.

[0020] This method mainly covers two parts, data preprocessing to facilitate the generation of encrypted netlist, and the actual execution of encryption algorithm to generate its encrypted netlist. The specific implementation steps are as follows:

[0021] first part:

[0022] Data preprocessing (1)

[0023] Step 1: Since the attacker can formulate different attack strategies to determine the value of the key bit according to the implanted position, firstly, the convergent key gate needs to be marked according to the pairwise security.

[0024] figure 2 An example of pairwise security convergent key gate. Assuming that the attacker wants to sensitize any key bit, the attacker must set any input bit of the OG log...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a logic encryption defense method based on key gate position selection. The method mainly comprises two parts: data preprocessing and a key gate position encryption algorithm.Specifically, in the encryption process, the positions of the secret key doors are marked in a data preprocessing mode, paths with too long delay are removed, and then a two-stage encryption algorithm is adopted for implanting the positions of the secret key doors and a main guide door. Finally, the Hamming distance and an area overhead are calculated to evaluate the security standard of the encrypted circuit. According to the method, the gate-level netlist encryption effect can be improved; the Hamming distance is greater than 50% through a dominant gate implantation algorithm; the output ambiguity is maximized, the security protection circuit is simple in structure, can resist secret key sensitization attacks, simultaneously reduces area overhead, comprehensively improves security evaluation requirements of logic encryption, reduces problems of IC theft and IP piracy in a chip design stage, and can effectively prevent design information from being maliciously stolen, so that the security protection circuit can be universally applied to logic encryption, and has relatively strong practicability.

Description

technical field [0001] The invention discloses a logic encryption defense method based on key gate position selection. Specifically, in the chip design process, the IP core provided by the third party is integrated into a gate-level netlist circuit. In the gate-level netlist circuit, for the determination of the position of the key gate and the analysis of the critical timing path, additional The logic gate performs netlist encryption. During the process, a corresponding strong interference encryption algorithm is used to perform pre-data processing on the combination position of the key gate. When all data processing is completed, the encryption is realized by two-stage encryption and verification of its Hamming distance. Netlist generation. Background technique [0002] As the complexity and cost of chip design time continue to increase, the design of integrated circuits has gradually shifted to the development of global foundries, outsourcing the process of IC manufactur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0618
Inventor 冯建华蔡宜君侯明浩
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products