Back to Search
Start Over
Hardware Obfuscation of AES through Finite Field Construction Variation
- Source :
- ISCAS
- Publication Year :
- 2019
- Publisher :
- IEEE, 2019.
-
Abstract
- To protect intellectual property, hardware obfuscation is necessary to conceal the implemented function. Besides logic-level approaches, hardware obfuscation can be done through algorithmic modifications. Prior algorithmic obfuscations address signal processing systems and those with variable data flow. This paper focuses on the obfuscation of systems based on finite field arithmetic, which are broadly adopted in digital communications. Netlists of hardware units with different field constructions are first analyzed to evaluate possible attacks. Taking into account the specifics of the computations in the Advanced Encryption Standard (AES) algorithm, optimized schemes are proposed to efficiently introduce obfuscation keys utilizing the variation of finite field construction. For an example pipelined fully-unrolled AES encryptor, the proposed scheme leads to 480 bits of obfuscation key with 3% area overhead without sacrificing the throughput. The proposed obfuscation method can be also extended to other algorithms involving finite field arithmetic.
- Subjects :
- Computer science
business.industry
Advanced Encryption Standard
02 engineering and technology
Encryption
020202 computer hardware & architecture
Obfuscation (software)
Finite field
Computer engineering
Obfuscation
0202 electrical engineering, electronic engineering, information engineering
Hardware obfuscation
Overhead (computing)
020201 artificial intelligence & image processing
Finite field arithmetic
business
Throughput (business)
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2019 IEEE International Symposium on Circuits and Systems (ISCAS)
- Accession number :
- edsair.doi...........b600ed01e2fad0865f211bde4eb76705
- Full Text :
- https://doi.org/10.1109/iscas.2019.8702285