5,253 research outputs found

    Secure Split Test for Preventing IC Piracy by Un-Trusted Foundry and Assembly

    Get PDF
    In the era of globalization, integrated circuit design and manufacturing is spread across different continents. This has posed several hardware intrinsic security issues. The issues are related to overproduction of chips without knowledge of designer or OEM, insertion of hardware Trojans at design and fabrication phase, faulty chips getting into markets from test centers, etc. In this thesis work, we have addressed the problem of counterfeit IC‟s getting into the market through test centers. The problem of counterfeit IC has different dimensions. Each problem related to counterfeiting has different solutions. Overbuilding of chips at overseas foundry can be addressed using passive or active metering. The solution to avoid faulty chips getting into open markets from overseas test centers is secure split test (SST). The further improvement to SST is also proposed by other researchers and is known as Connecticut Secure Split Test (CSST). In this work, we focus on improvements to CSST techniques in terms of security, test time and area. In this direction, we have designed all the required sub-blocks required for CSST architecture, namely, RSA, TRNG, Scrambler block, study of benchmark circuits like S38417, adding scan chains to benchmarks is done. Further, as a security measure, we add, XOR gate at the output of the scan chains to obfuscate the signal coming out of the scan chains. Further, we have improved the security of the design by using the PUF circuit instead of TRNG and avoid the use of the memory circuits. This use of PUF not only eliminates the use of memory circuits, but also it provides the way for functional testing also. We have carried out the hamming distance analysis for introduced security measure and results show that security design is reasonably good.Further, as a future work we can focus on: • Developing the circuit which is secuered for the whole semiconductor supply chain with reasonable hamming distance and less area overhead

    Revisited BIA-MS combination: Entire "on-a-chip" processing leading to the proteins identification at low femtomole to sub-femtomole levels

    No full text
    International audienceWe present the results of a study in which biomolecular interaction analysis (BIA, Biacore 2000) was combined with mass spectrometry (MS) using entire "on-a-chip" procedure. Most BIA-MS studies included an elution step of the analyte prior MS analysis. Here, we report a low-cost approach combining Biacore analysis with homemade chips and MS in situ identification onto the chips without elution step. First experiments have been made with rat serum albumin to determine the sensitivity and validation of the concept has been obtained with an antibody/antigen couple. Our "on-a-chip" procedure allowed complete analysis by MS-MS of the biochip leading to protein identifications at low femtomole to sub-femtomole levels. Using this technique, identification of protein complexes were routinely obtained giving the opportunity to the "on-a-chip" processing to complete the BIA-MS approach in the discovery and analysis of protein complexe

    Strong Cryptography: The Global Tide of Change

    Get PDF
    Encryption technology allows people using electronic networks to ensure that the messages they send remain private--secure from hackers, industrial espionage, government wiretap abuses, and spies. Encryption technology will prove vital to the future of electronic commerce. For example, thefts of nuclear secrets from U.S. national laboratories would be much less likely if the labs' commercial software had built-in encryption features that could be used to limit unauthorized access--a type of security product discouraged by export controls. For years the U.S. government has struggled unsuccessfully to control the export of encryption technology from this country. Those ineffectual controls do, however, adversely affect the competitive position of the U.S. software industry and national security. Despite the controls, powerful encryption products are increasingly available around the world. Those products include Pretty Good Privacy, which offers 128-bit encryption, and many others. This paper provides a list of Web sites where such products may be found, thus establishing beyond doubt the futility of controls. Although some of the Web sites may from time to time disappear, others will spring up in their place

    Long-term Data Security Challenges Using Cloud Storage Services

    Get PDF
    The relevance of cloud computing, especially cloud storage services, was growing steadily within the last years. By getting more acceptance from customers, there are several new issues coming up, especially the question of data security. Therefore this paper analysis impacts on data security in the future, based on recent encryption methods like AES and TLS used in combination with RSA, on a non-calculation perspective and without taking into account key exchange methods like Diffie Hellman. This paper discusses why it is important to think about data security issues right from today

    VLSI architectures for public key cryptology

    Get PDF
    corecore