Skip to main navigation Skip to search Skip to main content

Analysis of secret key revealing Trojan using path delay analysis for some cryptocores

  • Krishnendu Guha
  • , Romio Rosan Sahani
  • , Moumita Chakraborty
  • , Amlan Chakrabarti
  • , Debasri Saha
  • A. K. Choudhury School of Information Technology
  • University of Calcutta

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

The design outsourcing of the IC supply chain across the globe has been witnessed as a major trend of the semiconductor design industry in the recent era. The increasing profit margin has been a major boost for this trend. However, the vulnerability of the introduction of malicious circuitry (Hardware Trojan Horses) in the untrusted phases of chip development has been a major deterrent in this cost effective design methodology. Analysis, detection and correction of such Trojan Horses have been the point of focus among researchers over the recent years. In this work, analysis of a secret key revealing Hardware Trojan Horse is performed. This Trojan Horse creates a conditional path delay to the resultant output of the cryptocore according to the stolen bit of secret key per iteration. The work has been extended from the RTL design stage to the pre fabrication stage of ASIC platform where area and power analysis have been made to distinguish the affected core from a normal core in 180nm technology node.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Frontiers of Intelligent Computing
Subtitle of host publicationTheory and Applications, FICTA 2014
EditorsSiba K. Udgata, Suresh Chandra Satapathy, Bhabendra Narayan Biswal, J.K. Mandal
PublisherSpringer Verlag
Pages13-20
Number of pages8
ISBN (Electronic)9783319120119
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event3rd International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2014 - Bhubaneswar, India
Duration: 14 Nov 201415 Nov 2014

Publication series

NameAdvances in Intelligent Systems and Computing
Volume328
ISSN (Print)2194-5357

Conference

Conference3rd International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2014
Country/TerritoryIndia
CityBhubaneswar
Period14/11/1415/11/14

Keywords

  • AES
  • ASIC
  • DES
  • Hardware Trojan Horses (HTH)

Fingerprint

Dive into the research topics of 'Analysis of secret key revealing Trojan using path delay analysis for some cryptocores'. Together they form a unique fingerprint.

Cite this