Cargando…
Efficient design and analysis of secure CMOS logic through logic encryption
Untrusted third parties and untrustworthy foundries highlighted the significance of hardware security in the present-day world. Because of the globalization of integrated circuit (IC) design flow in the semiconductor industry, hardware security issues must be taken to prevent intellectual property (...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9859821/ https://www.ncbi.nlm.nih.gov/pubmed/36670188 http://dx.doi.org/10.1038/s41598-023-28007-2 |
_version_ | 1784874445481967616 |
---|---|
author | Chandra, Sai Srinivas Kannan, R. Jagadeesh Balaji, B. Saravana Veeramachaneni, Sreehari Noor Mahammad, Sk. |
author_facet | Chandra, Sai Srinivas Kannan, R. Jagadeesh Balaji, B. Saravana Veeramachaneni, Sreehari Noor Mahammad, Sk. |
author_sort | Chandra, Sai Srinivas |
collection | PubMed |
description | Untrusted third parties and untrustworthy foundries highlighted the significance of hardware security in the present-day world. Because of the globalization of integrated circuit (IC) design flow in the semiconductor industry, hardware security issues must be taken to prevent intellectual property (IP) piracy. Logic encryption is an efficient method to protect circuits from IP piracy, reverse engineering, and malicious tampering of IC for Trojan insertion. Researchers have proposed many logic encryption methods, which lead to overhead in circuit design parameters such as area, power, and performance. This paper aims to bring a trade-off between these parameters, with security being the main key factor, and ensure the design metrics by proposing a novel transistor-level method of logic encryption for CMOS gates. Experimental results show that, on the usage of proposed encrypted key gates, the design overheads such as area, power, delay, and energy are reduced by an average of 42.94%, 37.37%, 26.79%, and 50.96%, respectively, over the existing logic encryption-based topologies. |
format | Online Article Text |
id | pubmed-9859821 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-98598212023-01-22 Efficient design and analysis of secure CMOS logic through logic encryption Chandra, Sai Srinivas Kannan, R. Jagadeesh Balaji, B. Saravana Veeramachaneni, Sreehari Noor Mahammad, Sk. Sci Rep Article Untrusted third parties and untrustworthy foundries highlighted the significance of hardware security in the present-day world. Because of the globalization of integrated circuit (IC) design flow in the semiconductor industry, hardware security issues must be taken to prevent intellectual property (IP) piracy. Logic encryption is an efficient method to protect circuits from IP piracy, reverse engineering, and malicious tampering of IC for Trojan insertion. Researchers have proposed many logic encryption methods, which lead to overhead in circuit design parameters such as area, power, and performance. This paper aims to bring a trade-off between these parameters, with security being the main key factor, and ensure the design metrics by proposing a novel transistor-level method of logic encryption for CMOS gates. Experimental results show that, on the usage of proposed encrypted key gates, the design overheads such as area, power, delay, and energy are reduced by an average of 42.94%, 37.37%, 26.79%, and 50.96%, respectively, over the existing logic encryption-based topologies. Nature Publishing Group UK 2023-01-20 /pmc/articles/PMC9859821/ /pubmed/36670188 http://dx.doi.org/10.1038/s41598-023-28007-2 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Chandra, Sai Srinivas Kannan, R. Jagadeesh Balaji, B. Saravana Veeramachaneni, Sreehari Noor Mahammad, Sk. Efficient design and analysis of secure CMOS logic through logic encryption |
title | Efficient design and analysis of secure CMOS logic through logic encryption |
title_full | Efficient design and analysis of secure CMOS logic through logic encryption |
title_fullStr | Efficient design and analysis of secure CMOS logic through logic encryption |
title_full_unstemmed | Efficient design and analysis of secure CMOS logic through logic encryption |
title_short | Efficient design and analysis of secure CMOS logic through logic encryption |
title_sort | efficient design and analysis of secure cmos logic through logic encryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9859821/ https://www.ncbi.nlm.nih.gov/pubmed/36670188 http://dx.doi.org/10.1038/s41598-023-28007-2 |
work_keys_str_mv | AT chandrasaisrinivas efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption AT kannanrjagadeesh efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption AT balajibsaravana efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption AT veeramachanenisreehari efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption AT noormahammadsk efficientdesignandanalysisofsecurecmoslogicthroughlogicencryption |