• DocumentCode
    604646
  • Title

    On the design of Trojan tolerant finite field multipliers

  • Author

    Veedon, C.T. ; Poolakkaparambil, M. ; Jabir, A.M. ; Mathew, Jinesh

  • Author_Institution
    Dept. of Comput. & Commun. Technol., Oxford Brookes Univ., Oxford, UK
  • fYear
    2013
  • fDate
    22-23 March 2013
  • Firstpage
    450
  • Lastpage
    454
  • Abstract
    In this paper we analyze the process variation in different multiplier circuits and describe techniques to design error correcting circuits. Integrated circuits have reached such a level of integration that the length transistors is limited to 10s of nanometres. The increasing difficulty to fabricate millions of transistors of the same parameters specified in the integrated circuit design have lead to variation in the performance of the integrated circuit, for instance the thickness of the gate oxide, the length and width of the of the transistor, the doping concentration in the N well substrate, gate threshold voltage and so on. This process variation can be misused for Trojan attacks. Trojan attacks are based on injecting some fault in to the cryptosystem and observing any leak of information by analyzing the erroneous results due to the additional Trojan circuitry. In order to avoid such fault-based attacks, the cryptosystem can be used to detect errors and correct computations, thereby not producing any erroneous results as output. In this paper we further discuss about the error correcting finite field multiplier, as on-line error correction is done it results in more robust hardware modules. The Trojan circuitry can be added even after the error correction stage and hence we have designed a new technique such that error detection and correction is done irrespective of the position of the Trojan in the multiplier.
  • Keywords
    cryptography; error correction; error detection; fault diagnosis; integrated circuit design; invasive software; logic design; logic gates; multiplying circuits; N well substrate; Trojan attack; Trojan circuitry; Trojan position; Trojan tolerant finite field multiplier design; cryptosystem; doping concentration; erroneous result analysis; error correcting circuit design; error correcting finite field multiplier; error detection; fault injection; fault-based attack; gate oxide thickness; gate threshold voltage; hardware module; information leak; integrated circuit design; multiplier circuit; online error correction; process variation analysis; transistor length; transistor width; Cryptography; Error correction; Finite element analysis; Galois fields; Logic gates; Polynomials; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
  • Conference_Location
    Kottayam
  • Print_ISBN
    978-1-4673-5089-1
  • Type

    conf

  • DOI
    10.1109/iMac4s.2013.6526453
  • Filename
    6526453