Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

IC Protection from IP and IC Piracy using AES Logic Encryption


     

   Subscribe/Renew Journal


Most of the IC’s are implemented by means of IP piracy and IC piracy. Usage of hardware intellectual property by the third party is known as IP piracy and manufacturing the IC without the knowledge of IC owner is known as IC piracy. The objective of this paper is to avoid this IP piracy and IC piracy. Various methods to avoid this IP and IC piracy are exist in the literature such as logic obfuscation, logic encryption, split manufacturing, IC Camouflaging, and Trojan Activation. This paper deals with the logic encryption method to avoid the IP and IC piracy. Logic encryption is done by means of introducing the key gates where one of the input given to the key gates is called as key input. In our proposed paper, AES encrypted key is given to the key circuit.


Keywords

IP Piracy, IC Piracy, AES, Encryption, Key
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 233

PDF Views: 2




  • IC Protection from IP and IC Piracy using AES Logic Encryption

Abstract Views: 233  |  PDF Views: 2

Authors

Abstract


Most of the IC’s are implemented by means of IP piracy and IC piracy. Usage of hardware intellectual property by the third party is known as IP piracy and manufacturing the IC without the knowledge of IC owner is known as IC piracy. The objective of this paper is to avoid this IP piracy and IC piracy. Various methods to avoid this IP and IC piracy are exist in the literature such as logic obfuscation, logic encryption, split manufacturing, IC Camouflaging, and Trojan Activation. This paper deals with the logic encryption method to avoid the IP and IC piracy. Logic encryption is done by means of introducing the key gates where one of the input given to the key gates is called as key input. In our proposed paper, AES encrypted key is given to the key circuit.


Keywords


IP Piracy, IC Piracy, AES, Encryption, Key