A defense mechanism against hardware Trojan insertion by third-party intellectual property (IP) design blocks in AES-based secured communication system

The available hardware Trojan insertion techniques in IC design and the prevention methods against these hardware Trojans are reviewed. The focus of the paper is on the hardware Trojan insertion by the third-party IP design blocks and its prevention method. The AES-based secured communication system...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd. Noor, Nur Qamarina, Mohd. Daud, Salwani
Format: Article
Published: Springe 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/84499/
https://doi.org/10.1007/s41870-017-0011-1
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Description
Summary:The available hardware Trojan insertion techniques in IC design and the prevention methods against these hardware Trojans are reviewed. The focus of the paper is on the hardware Trojan insertion by the third-party IP design blocks and its prevention method. The AES-based secured communication system codename Alpha is demonstrated to be susceptible to the hardware Trojan insertion that is induced by the third-party IP design blocks. In order to prevent this hardware Trojan to manifest in Alpha system, the Alpha system is modified and redesigned. The Trojan-infected Alpha system and modified Alpha system codename ModAlpha are implemented on the ATLYS board. The area utilization and timing information of both systems are extracted and analyzed. The hardware implementation results for both systems are also observed on the UART terminal after the message is inputted by the keyboard. It is proven that the Trojan-infected Alpha system leaks the encryption key on the UART terminal while the modified Alpha system produces the correct cipher text.