Cargando…

Efficient design and analysis of secure CMOS logic through logic encryption

Untrusted third parties and untrustworthy foundries highlighted the significance of hardware security in the present-day world. Because of the globalization of integrated circuit (IC) design flow in the semiconductor industry, hardware security issues must be taken to prevent intellectual property (...

Descripción completa

Detalles Bibliográficos
Autores principales: Chandra, Sai Srinivas, Kannan, R. Jagadeesh, Balaji, B. Saravana, Veeramachaneni, Sreehari, Noor Mahammad, Sk.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9859821/
https://www.ncbi.nlm.nih.gov/pubmed/36670188
http://dx.doi.org/10.1038/s41598-023-28007-2
_version_ 1784874445481967616
author Chandra, Sai Srinivas
Kannan, R. Jagadeesh
Balaji, B. Saravana
Veeramachaneni, Sreehari
Noor Mahammad, Sk.
author_facet Chandra, Sai Srinivas
Kannan, R. Jagadeesh
Balaji, B. Saravana
Veeramachaneni, Sreehari
Noor Mahammad, Sk.
author_sort Chandra, Sai Srinivas
collection PubMed
description Untrusted third parties and untrustworthy foundries highlighted the significance of hardware security in the present-day world. Because of the globalization of integrated circuit (IC) design flow in the semiconductor industry, hardware security issues must be taken to prevent intellectual property (IP) piracy. Logic encryption is an efficient method to protect circuits from IP piracy, reverse engineering, and malicious tampering of IC for Trojan insertion. Researchers have proposed many logic encryption methods, which lead to overhead in circuit design parameters such as area, power, and performance. This paper aims to bring a trade-off between these parameters, with security being the main key factor, and ensure the design metrics by proposing a novel transistor-level method of logic encryption for CMOS gates. Experimental results show that, on the usage of proposed encrypted key gates, the design overheads such as area, power, delay, and energy are reduced by an average of 42.94%, 37.37%, 26.79%, and 50.96%, respectively, over the existing logic encryption-based topologies.
format Online
Article
Text
id pubmed-9859821
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-98598212023-01-22 Efficient design and analysis of secure CMOS logic through logic encryption Chandra, Sai Srinivas Kannan, R. Jagadeesh Balaji, B. Saravana Veeramachaneni, Sreehari Noor Mahammad, Sk. Sci Rep Article Untrusted third parties and untrustworthy foundries highlighted the significance of hardware security in the present-day world. Because of the globalization of integrated circuit (IC) design flow in the semiconductor industry, hardware security issues must be taken to prevent intellectual property (IP) piracy. Logic encryption is an efficient method to protect circuits from IP piracy, reverse engineering, and malicious tampering of IC for Trojan insertion. Researchers have proposed many logic encryption methods, which lead to overhead in circuit design parameters such as area, power, and performance. This paper aims to bring a trade-off between these parameters, with security being the main key factor, and ensure the design metrics by proposing a novel transistor-level method of logic encryption for CMOS gates. Experimental results show that, on the usage of proposed encrypted key gates, the design overheads such as area, power, delay, and energy are reduced by an average of 42.94%, 37.37%, 26.79%, and 50.96%, respectively, over the existing logic encryption-based topologies. Nature Publishing Group UK 2023-01-20 /pmc/articles/PMC9859821/ /pubmed/36670188 http://dx.doi.org/10.1038/s41598-023-28007-2 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Chandra, Sai Srinivas
Kannan, R. Jagadeesh
Balaji, B. Saravana
Veeramachaneni, Sreehari
Noor Mahammad, Sk.
Efficient design and analysis of secure CMOS logic through logic encryption
title Efficient design and analysis of secure CMOS logic through logic encryption
title_full Efficient design and analysis of secure CMOS logic through logic encryption
title_fullStr Efficient design and analysis of secure CMOS logic through logic encryption
title_full_unstemmed Efficient design and analysis of secure CMOS logic through logic encryption
title_short Efficient design and analysis of secure CMOS logic through logic encryption
title_sort efficient design and analysis of secure cmos logic through logic encryption
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9859821/
https://www.ncbi.nlm.nih.gov/pubmed/36670188
http://dx.doi.org/10.1038/s41598-023-28007-2
work_keys_str_mv AT chandrasaisrinivas efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption
AT kannanrjagadeesh efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption
AT balajibsaravana efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption
AT veeramachanenisreehari efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption
AT noormahammadsk efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption