143 research outputs found
HARDWARE ATTACK DETECTION AND PREVENTION FOR CHIP SECURITY
Hardware security is a serious emerging concern in chip designs and applications. Due to the globalization of the semiconductor design and fabrication process, integrated circuits (ICs, a.k.a. chips) are becoming increasingly vulnerable to passive and active hardware attacks. Passive attacks on chips result in secret information leaking while active attacks cause IC malfunction and catastrophic system failures. This thesis focuses on detection and prevention methods against active attacks, in particular, hardware Trojan (HT). Existing HT detection methods have limited capability to detect small-scale HTs and are further challenged by the increased process variation. We propose to use differential Cascade Voltage Switch Logic (DCVSL) method to detect small HTs and achieve a success rate of 66% to 98%. This work also presents different fault tolerant methods to handle the active attacks on symmetric-key cipher SIMON, which is a recent lightweight cipher. Simulation results show that our Even Parity Code SIMON consumes less area and power than double modular redundancy SIMON and Reversed-SIMON, but yields a higher fault -detection-failure rate as the number of concurrent faults increases. In addition, the emerging technology, memristor, is explored to protect SIMON from passive attacks. Simulation results indicate that the memristor-based SIMON has a unique power characteristic that adds new challenges on secrete key extraction
Practical free-space quantum key distribution
Within the last two decades, the world has seen an exponential increase in the quantity
of data traffic exchanged electronically. Currently, the widespread use of classical
encryption technology provides tolerable levels of security for data in day to day life.
However, with one somewhat impractical exception these technologies are based on
mathematical complexity and have never been proven to be secure. Significant advances
in mathematics or new computer architectures could render these technologies obsolete
in a very short timescale.
By contrast, Quantum Key Distribution (or Quantum Cryptography as it is sometimes
called) offers a theoretically secure method of cryptographic key generation and
exchange which is guaranteed by physical laws. Moreover, the technique is capable of
eavesdropper detection during the key exchange process. Much research and
development work has been undertaken but most of this work has concentrated on the
use of optical fibres as the transmission medium for the quantum channel. This thesis
discusses the requirements, theoretical basis and practical development of a compact,
free-space transmission quantum key distribution system from inception to system tests.
Experiments conducted over several distances are outlined which verify the feasibility
of quantum key distribution operating continuously over ranges from metres to intercity distances and finally to global reach via the use of satellites
Methodologies synthesis
This deliverable deals with the modelling and analysis of interdependencies between critical infrastructures, focussing attention on two interdependent infrastructures studied in the context of CRUTIAL: the electric power infrastructure and the information infrastructures
supporting management, control and maintenance functionality. The main objectives are: 1) investigate the main challenges to be addressed for the analysis and modelling of interdependencies, 2) review the modelling methodologies and tools that can be used to address these challenges and support the evaluation of the impact of interdependencies on the dependability and resilience of the service delivered to the users, and 3) present the preliminary directions investigated so far by the CRUTIAL consortium for describing and modelling interdependencies
Low Power Memory/Memristor Devices and Systems
This reprint focusses on achieving low-power computation using memristive devices. The topic was designed as a convenient reference point: it contains a mix of techniques starting from the fundamental manufacturing of memristive devices all the way to applications such as physically unclonable functions, and also covers perspectives on, e.g., in-memory computing, which is inextricably linked with emerging memory devices such as memristors. Finally, the reprint contains a few articles representing how other communities (from typical CMOS design to photonics) are fighting on their own fronts in the quest towards low-power computation, as a comparison with the memristor literature. We hope that readers will enjoy discovering the articles within
- …