A Security Analysis of Circuit Clock Obfuscation
نویسندگان
چکیده
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated from untrusted foundry end-user. The based on creating ambiguity in original by inserting “key” input bits into such unintelligible absent correct secret key. Clock signals have traditionally been avoided locking order not corrupt timing behavior locked circuit. In this paper, we explore case where clock signal itself may obfuscated ambiguating its frequency pattern. Along with discussing formal notions security context, present practical ways deobfuscate designs using techniques multi-rate model-checking. We experimental data deobfuscation runtime set sequential benchmark circuits. Our results show naive random provide more per overhead than traditional keyed-gate insertion. discuss how attractive choice for special are inherently multi-clock/asynchronous.
منابع مشابه
Shorter Circuit Obfuscation in Challenging Security Models
The study of program obfuscation is seeing great progress in recent years, which is crucially attributed to the introduction of graded encoding schemes by Garg, Gentry and Halevi (Eurocrypt 2013). In such schemes, elements of a ring can be encoded such that the content of the encoding is hidden, but restricted algebraic manipulations, followed by zero-testing, can be performed publicly. This pr...
متن کاملCircuit Obfuscation Using Braids
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography. Until recently, theoretical progress has mainly been limited to no-go results. Recent works have proposed the first efficient obfuscation algorithms for classical logic circuits, based on a n...
متن کاملObfuscation ⇒ (IND-CPA Security !⇒ Circular Security)
Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security the adversary is given an extra “hint” consisting of a cycle of encryption of secret keys i.e., (Epk1(sk2), . . . , Epkn(sk1)). A natural question is whether every IND-CPA encryption scheme is also circular secure. It is trivial to see that this is no...
متن کاملObfuscation ⇒ ( IND - CPA Security 6 ⇒ Circular Security )
Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security the adversary is given an extra “hint” consisting of a cycle of encryption of secret keys i.e., (Epk1(sk2), . . . , Epkn(sk1)). A natural question is whether every IND-CPA encryption scheme is also circular secure. It is trivial to see that this is no...
متن کاملa swot analysis of the english program of a bilingual school in iran
با توجه به جایگاه زبان انگلیسی به عنوان زبانی بین المللی و با در نظر گرفتن این واقعیت که دولت ها و مسئولان آموزش و پرورش در سراسر جهان در حال حاضر احساس نیاز به ایجاد موقعیتی برای کودکان جهت یاد گیری زبان انگلیسی درسنین پایین در مدارس دو زبانه می کنند، تحقیق حاضر با استفاده از مدل swot (قوت ها، ضعف ها، فرصتها و تهدیدها) سعی در ارزیابی مدرسه ای دو زبانه در ایران را دارد. جهت انجام این تحقیق در م...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography
سال: 2022
ISSN: ['2410-387X']
DOI: https://doi.org/10.3390/cryptography6030043