Loading

Hybrid Obfuscation with key Based Encryption for Integrated Circuits
T. Pattalu Naidu1, A. Kamala Kumari2

1T. Pttalu Naidu*, Research Scholar in the Department of Instrument Technology, Andhra University, Visakhapatnam, India.
2Dr. A. Kamala Kumari, Assistant professor, Department of Instrument Technology, Andhra University, Visakhapatnam, India. 

Manuscript received on November 18, 2019. | Revised Manuscript received on 26 November, 2019. | Manuscript published on December 10, 2019. | PP: 3215-3220 | Volume-9 Issue-2, December 2019. | Retrieval Number: B8118129219/2019©BEIESP | DOI: 10.35940/ijitee.B8118.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A new functional encryption method applied for integrated circuit (IC) is proposed in this paper which is called as hybrid obfuscation. The hardware obfuscation or encryption function is a countermeasures act utilized to provide safety of circuit from malware attack and unauthorized entry at the time of manufacture by the distrusted foundries across the world. The purpose of encryption is to design and embed secret keys for achieving functional modifications at the design space itself. Such keys are programmed suddenly inside the ICs when they are obtained from the factory. Since the distrusted factory doesn’t approach the key, they can’t dispose of the extra components of the chip which doesn’t work effectively without the key. By joining existing procedures of obscurity known as fixed obfuscation and dynamic obfuscation, the half and half muddling strategy accomplish the objectives of an encryption function. The investigation of safety efforts proves that the functional encryption enhances the design security as contrasted with existing method. In addition, the proposed method decreases zone overhead by 40% and control overhead by 30% for a key length of 30 bits contrasted with the active obscurity. 
Keywords: Dynamic and Hybrid Obfuscation, Functional Obfuscation, Hardware Trojan and Security, Logical Encryption.
Scope of the Article: Logic, Functional programming and Microcontrollers for IoT