Unified Pre-Fabrication and Post-Fabrication Hardware Security.

Date of Submission

December 2015

Date of Award

Winter 12-12-2016

Institute Name (Publisher)

Indian Statistical Institute

Document Type

Master's Dissertation

Degree Name

Master of Technology

Subject Name

Computer Science

Department

Advance Computing and Microelectronics Unit (ACMU-Kolkata)

Supervisor

Sur-Kolay, Susmita (ACMU-Kolkata; ISI)

Abstract (Summary of the Work)

Hardware security has emerged as a premier design and manufacturing objective due to the confluence of economic, social, and technology forces. All algorithmically secured cryptographic primitives and protocols rely on a hardware root of trust to deliver the expected protections when implemented in software.About 25% of the chip design companies send their design to another company for either further integration or fabrication. While this facilitates design reuse and shorter time-to-market, it also provides the opportunity for malicious misappropriation of design. Currently available key based methods resolve this problem by introducing an initialization phase. In this phase, if the initialization is done by a correct initialization code then only the chip works properly. However, the dsiadvantage of this method is that if someone gets hold of the initialization code, then they can initialize all other illegal copies of the chip with the same code.In this thesis, we have proposed a model by which the chip initialization can be done with different codes. So even if someone knows one initialization key they cannot hack a new chip. Moreover, the method is more robust compared to the available key based method, in terms of the probability of success of a brute-force attack. It also provides a scheme by which each chip can be authenticated uniquely. The model consists of two special modules; one generates the initialization key and the other module enables the main module to work properly if the initialization code is correct.

Comments

ProQuest Collection ID: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:28843392

Control Number

ISI-DISS-2015-328

Creative Commons License

Creative Commons Attribution 4.0 International License
This work is licensed under a Creative Commons Attribution 4.0 International License.

DOI

http://dspace.isical.ac.in:8080/jspui/handle/10263/6485

This document is currently not available here.

Share

COinS