Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4889
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mazumdar, Bodhisatwa | en_US |
dc.contributor.author | Bairwa, Ghanshyam | en_US |
dc.contributor.author | Mandal, Souvik | en_US |
dc.contributor.author | Nikhil, Tatavarthy Venkat | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:35:54Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:35:54Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Mazumdar, B., Saha, S., Bairwa, G., Mandal, S., & Nikhil, T. V. (2019). Classical cryptanalysis attacks on logic locking techniques. Journal of Electronic Testing: Theory and Applications (JETTA), 35(5), 641-654. doi:10.1007/s10836-019-05838-4 | en_US |
dc.identifier.issn | 0923-8174 | - |
dc.identifier.other | EID(2-s2.0-85075477168) | - |
dc.identifier.uri | https://doi.org/10.1007/s10836-019-05838-4 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4889 | - |
dc.description.abstract | Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house. As the correct key values are provided by the design house after production, a malicious adversary in the foundry house will not be able to unlock overproduced or counterfeit ICs. In this paper, we mount linear approximation attacks and differential attacks on random logic locking (RLL), fault-analysis based logic locking (FLL), and strong logic locking (SLL) techniques. We present a formal approach to mount the linear approximation attack on multiple circuit partitions and thereafter combining the approximations to form the attack on a locked logic cone of the circuit. We present our results on ISCAS’85 benchmark circuits. In linear approximation attack, the combinatorial blocks are partitioned and expressed as linear expressions to derive a relation between the primary inputs and the primary outputs of the circuit. The attack aims to determine the linear approximation that has the highest probability of occurrence for the correct key input. In differential attacks, we could recover the embedded secret key in device with attack effort lesser than exhaustive search attack. © 2019, Springer Science+Business Media, LLC, part of Springer Nature. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.source | Journal of Electronic Testing: Theory and Applications (JETTA) | en_US |
dc.subject | Foundries | en_US |
dc.subject | Houses | en_US |
dc.subject | Integrated circuit design | en_US |
dc.subject | Integrated circuits | en_US |
dc.subject | Keys (for locks) | en_US |
dc.subject | Locks (fasteners) | en_US |
dc.subject | Side channel attack | en_US |
dc.subject | Input differential | en_US |
dc.subject | Key gate | en_US |
dc.subject | Linear approximations | en_US |
dc.subject | Logic locking | en_US |
dc.subject | Output differential | en_US |
dc.subject | Computer circuits | en_US |
dc.title | Classical Cryptanalysis Attacks on Logic Locking Techniques | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: