Hardware Trojans detection in chaos-based cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advancing the State-of-the-Art in Hardware Trojans Detection

Over the past decade, Hardware Trojans (HTs) research community has made significant progress towards developing effective countermeasures for various types of HTs, yet these countermeasures are shown to be circumvented by sophisticated HTs designed subsequently. Therefore, instead of guaranteeing a certain (low) false negative rate for a small constant set of publicly known HTs, a rigorous sec...

متن کامل

Chaos Based Cryptography

This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The structure of two contemporary symmetric key encryption schemes using the Logistic map is discussed and their performance is evaluated based on a battery of tests and some qualitative measures. It is deduced that one scheme performs far better than the other. It is then experimentally shown that the performance ...

متن کامل

Hardware Trojans – Prevention, Detection, Countermeasures (A Literature Review)

A Hardware Trojan is a malicious, undesired, intentional modification of an electronic circuit or design, resulting in the incorrect behaviour of an electronic device when in operation – a back-door that can be inserted into hardware. A Hardware Trojan may be able to defeat any and all security mechanisms (software or hardware-based) and subvert or augment the normal operation of an infected de...

متن کامل

Chaos-based Cryptography: an overview

We review some of the recent work on chaos-based cryptography. We argue that if a chaotic map f is used in cryptography, then it should be implemented as a bijection FM : D → D, where D is a finite set with cardinality M, such that, for large M, FM ‘approximates well’ the chaotic map f . Several examples, including chaotic block cypher and chaotic public-key encryption algorithm, are given.

متن کامل

Stealthy Dopant-Level Hardware Trojans

With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the Polish Academy of Sciences Technical Sciences

سال: 2017

ISSN: 2300-1917

DOI: 10.1515/bpasts-2017-0078