Font Size: a A A

Research On Key Technology Of Hardware Trojan Security Protection Based On Logic Encryption

Posted on:2020-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:K Y SongFull Text:PDF
GTID:2518306518469334Subject:IC Engineering
Abstract/Summary:PDF Full Text Request
As an outcome of the development of modern informatization,integrated circuits have been widely applied to all walks of life and become the foundation of the information society.However,along with the arrival of globalization of the integrated circuits,the design and manufacture are gradually separated,causing hardware Trojan to be implanted into the integrated circuit by the attacker to destroy the circuit.Due to the small size and concealment of the hardware Trojan,the detection of hardware Trojan is more and more difficult.The protective design of the hardware Trojan can solve the security threat of the hardware Trojan once and for all.The paper carried out research on the security protection design of hardware Trojan's anti-implantation and weakening function.Firstly,based on fault injection analysis and path sensitization analysis,an enhanced logic encryption algorithm based on the security key is designed.Secondly,according to the characteristics of the hardware Trojan's trigger circuit,analyzing the hardware Trojan's implantation method and triggering the process,the combination of the rare nodes of the circuit is determined as the trigger condition of the hardware Trojan.Eliminating the rare nodes of the circuit,combined with the double-key logic gate structure,the logic encryption algorithm based on rare node elimination,is implemented to realize the anti-implantation of the hardware Trojan.Thirdly,taking the load circuit of the hardware Trojan as the entry point,analyzing the topology of the circuit,the locations of key-gates is determined to utilize the fault injection algorithm.Constructing the key-gates library,the key-gates are inserted through the combination of direct replacement and indirect replacement.A fully correlated key interdependency block is designed,and the weakening function of hardware Trojan is realized.Finally,the hardware Trojan's anti-implantation and functional weakening are simulated,respectively.The simulation results show that the rare node elimination rate is over 98% when the extra area does not exceed 2.5% and the extra transition power consumption does not exceed 10%,which can eliminate the rare nodes of the circuit to prevent hardware Trojan implantation.The hardware Trojan's function weakening is verified utilizing three different kinds of leaked-information hardware Trojan circuits.The simulation results show that the critical information leaked by the three hardware Trojans is disordered when the key-inputs of the key-gates are wrong.The area of the circuit is increased by about 5%,and when the key error rate is 35%,the Hamming distance of the output reaches 50%,which realizes the weakening function of the hardware Trojan,and ultimately the hardware Trojan security protection based on logic encryption is realized.
Keywords/Search Tags:Hardware Trojan anti-implantation, Weakening function, Logic encryption algorithm, Key-gates
PDF Full Text Request
Related items