Font Size: a A A

Research On Hardware IP Core Protection Based On Orthogonal Obfuscation

Posted on:2021-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:J W WangFull Text:PDF
GTID:2518306461458764Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the development of the integrated circuit industry and the progress of semiconductor technology,the scale of chips has become larger,and more functions can be achieved with a single chip.It is increasingly difficult for a single company or design team to complete all functions of a complex System on Chip(So C).It is more and more common to design chips with multi-party cooperation or use third-party hardware Intellectual Property(IP)to complete the design.In multiparty cooperation,hardware IP cores are most likely to leak design information,which brings security risks to IP.So how to effectively protect the IP core is becoming an urgent problem.Aiming at common hardware threats mainly involving the leakage of hardware IP core information,this article designs an orthogonal obfuscation method to protect the hardware IP core design information from being leaked,protect multiple parties chips from being attacked,and protect the interests of designers from being harmed.The research content of this thesis mainly includes the following parts:1.Orthogonal obfuscation algorithm design: Based on the support of mathematical theory,the content and optimization process of orthogonal obfuscation algorithm is introduced in detail.The design process of the orthogonal obfuscation hardware algorithm includes: constructing an orthogonal operation model with the feature matrix and the external input key through theoretical analysis,designing the overall algorithm architecture of the orthogonal obfuscation;implementing the mapping from the theoretical algorithm to the hardware circuit;weighing the algorithm overhead,formulating Multi-cycle implementation of the algorithm to improve the algorithm timing and reduce the overhead;preprocesses the data according to the theoretical limitations of the algorithm to ensure the functionality and stability of the orthogonal obfuscation algorithm.2.Multi-hardware IP core protection based on orthogonal obfuscation: Based on the design of orthogonal obfuscation algorithm,a security protection method for multi-hardware IP core is proposed.This method uses a feature matrix orthogonal multiplies the input key to hide the state and circuits,and identifies multiple members.The orthogonal obfuscation key transfer protocol covers the stages of IC design,chip testing and verification,and later sales.On the premise of guaranteeing the correctness of the original function of the chip,it provides strict information protection for each stage and guarantees hardware security in a multi-party cooperation model.Experiments demonstrate that the proposed method has a register state flip difference of less than5% with different keys input,and the area and power consumption ratio for less than 2% in larger circuits.Multi-hardware IP core protection design based on orthogonal obfuscation can effectively resist multiple hardware attacks,provide users with independent keys,and attain the effect of protecting hardware IP cores.3.RISC-V design based on orthogonal obfuscation: After application experiments on the hardware IP core,it concludes that the orthogonal obfuscation algorithm has stable hardware overhead,is suitable for large-scale logic circuits,supports parametritis configuration feature matrix scale,well protects information leakage and so on.According to the characteristics of the orthogonal obfuscation hardware algorithm,Section 5 applies the orthogonal obfuscation hardware algorithm to the open source RISC-V architecture and uses the orthogonal obfuscation method to protect the extended instruction set of RISC-V.This extended instruction set RISC-V design based on orthogonal obfuscation has been taped out in TSMC65 nm CMOS process,and the chip has been tested for resistance to attack.The experimental results show that the orthogonal obfuscation key authentication method provides a block authorization scheme for RISC-V,and its security is36.3% higher than simple key matching.It can effectively resist hardware attacks such as design information leakage,power analysis attacks,and brute force attacks,which further enhance the security of the chip design process and ensure teamwork for complex So Cs.This article had multiple sets of experiments by designing orthogonal obfuscation hardware algorithms and applying them to hardware security IP cores of varying sizes.The results show that the orthogonal obfuscation method proposed in this paper can make up for the lack of security protection measures in the industry for multi-party cooperative design of chips,solve the problem of information leakage of design members to a certain extent,and effectively protect hardware IP cores at the cost of limited hardware overhead.
Keywords/Search Tags:Orthogonal Obfuscation, Hardaware IP Core, Hardware Protection Strategy, Chip Security, VLSI Implementation
PDF Full Text Request
Related items