Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4889
Title: Classical Cryptanalysis Attacks on Logic Locking Techniques
Authors: Mazumdar, Bodhisatwa
Bairwa, Ghanshyam
Mandal, Souvik
Nikhil, Tatavarthy Venkat
Keywords: Foundries;Houses;Integrated circuit design;Integrated circuits;Keys (for locks);Locks (fasteners);Side channel attack;Input differential;Key gate;Linear approximations;Logic locking;Output differential;Computer circuits
Issue Date: 2019
Publisher: Springer
Citation: Mazumdar, B., Saha, S., Bairwa, G., Mandal, S., & Nikhil, T. V. (2019). Classical cryptanalysis attacks on logic locking techniques. Journal of Electronic Testing: Theory and Applications (JETTA), 35(5), 641-654. doi:10.1007/s10836-019-05838-4
Abstract: Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house. As the correct key values are provided by the design house after production, a malicious adversary in the foundry house will not be able to unlock overproduced or counterfeit ICs. In this paper, we mount linear approximation attacks and differential attacks on random logic locking (RLL), fault-analysis based logic locking (FLL), and strong logic locking (SLL) techniques. We present a formal approach to mount the linear approximation attack on multiple circuit partitions and thereafter combining the approximations to form the attack on a locked logic cone of the circuit. We present our results on ISCAS’85 benchmark circuits. In linear approximation attack, the combinatorial blocks are partitioned and expressed as linear expressions to derive a relation between the primary inputs and the primary outputs of the circuit. The attack aims to determine the linear approximation that has the highest probability of occurrence for the correct key input. In differential attacks, we could recover the embedded secret key in device with attack effort lesser than exhaustive search attack. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.
URI: https://doi.org/10.1007/s10836-019-05838-4
https://dspace.iiti.ac.in/handle/123456789/4889
ISSN: 0923-8174
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: