Preventing Data Leakage by Trojans in Commercial and ASIC Applications Using TDM and DES Encryption and Decryption

Saumitr Pathak,Nirmala Devi M

Lecture notes in electrical engineering(2023)

引用 0|浏览0
暂无评分
摘要
The purpose of this work is to provide a justification to the notion of reducing the leakage of data by the data leakage Trojans in the modulation scheme of TDM (Time Division Multiplexing) by using the DES (Data Encryption Standard) encryption and decryption concept. The Data Encryption Standard (DES) is a block cipher that uses symmetric keys and can both encrypt and decode data. When it comes to producing hardware, a manufacturing company's first priority usually is to do identification and prevention of hardware Trojan assaults. Because the device Trojans can get important information about users such as encryption keys, passwords, and so on, it may be used to steal this information. Therefore, the defensive strategy used here focuses on the prevention of data leakage and not the identification of Trojan. The current system employs the idea of RECORD, which stands for randomized encryption of combinational logic for resistance to data leakage, in order to keep the data from the hardware Trojans from leaking out, despite the fact that the Trojans already know all of the information. Therefore, the suggested system of the TDM version of RECORD design is more secure than the Sequential RECORD system, and these cases of recent works have not focused on proving that TDM RECORD DES Decryption Algorithm is valid. Therefore, the proposed work of this paper will use the concept of a TDM version of RECORD with its implementation in Encryption and Decryption Algorithm with BER Testing. This method is designed in Verilog HDL and we have shown a study on this encryption and proposed decryption unit for degree of scrambling.
更多
查看译文
关键词
des encryption,data leakage,decryption,trojans,asic applications
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要