Font Size: a A A

Research On Identity Authentication Technology Based On IC Circuit Copyright Protection

Posted on:2019-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuangFull Text:PDF
GTID:2428330566992277Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The existing digital IP(Intellectual Property)circuits mainly protected by watermarking techniques.In these techniques,the ownership information is encrypted and inserted into designs for the protection of intellectual property.In the actual IP circuit module reuse technology,if a single IP circuit inspector or verifier has deliberately leaked the key information of the IP system in the transmission process,the illegal attacker can easily guess the key information of a single IP circuit according to the key information,and tamper the copyright information of various IP circuits through various conspiracy attacks in order to destroy the related copyright.The emergence of these problems will bring huge security challenges to the protection of copyright information in IP system.Therefore,it will be a very important work to study and find an efficient IC(Integrated Circuit)hardware authentication method.The main work of this paper is as follows:(1)An IP circuit protection algorithm is proposedbased on ECC encryption model.This method proposes a security authentication model based on ECC asymmetric encryption.Then,on the basis of the design of ECC encryption protocol,the embedded location of the circuit is abstracted as the information of the network graph in the graph theory,and the related IP circuit attribute information is authenticated by the ordering attributes of the topology of the midline network in the network graph of the node line.The proposed algorithm has low overhead in ownership authentication.Besides,it has good resistance against various illegal attacks.(2)A Hausdorff distance modelbased IC authentication algorithm based on is proposed.The LUT resources are analyzed and abstracted into cell nodes.The depth first search method is used to set the detection point in the idle position near the original design node resources from the FPGA.The Hausdorff distance function is used to establish a security constraint based on the Hausdorff distance function.The IP circuit position data constraint set of the model is set.Finally,we use the commonly used illegal attack methods such as removal attack for evaluation.The results show that,under the optimal constraint model of Hausdorff distance,the selected IP circuit location information is more concealed,the computing complexity of the IP circuit is low and the speed of the IP circuit authentication is faster,and it has good superiority in the resource overhead and delay delay of the IP circuit authentication.
Keywords/Search Tags:ECC, FPGA, IC Authentication, Hausdorff distance model, Optimal constraint function
PDF Full Text Request
Related items