Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
PLoS One ; 16(12): e0261431, 2021.
Article in English | MEDLINE | ID: mdl-34941912

ABSTRACT

Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government. Its hardware implementation offers much higher speed and physical security than that of its software implementation. The testability and hardware Trojans are two significant concerns that make the AES chip complex and vulnerable. The problem of testability in the complex AES chip is not addressed yet, and also, the hardware Trojan insertion into the chip may be a significant security threat by leaking information to the intruder. The proposed method is a dual-mode self-test architecture that can detect the hardware Trojans at the manufacturing test and perform an online parametric test to identify parametric chip defects. This work contributes to partitioning the AES circuit into small blocks and comparing adjacent blocks to ensure self-referencing. The detection accuracy is sharpened by a comparative power ratio threshold, determined by process variations and the accuracy of the built-in current sensors. This architecture can reduce the delay, power consumption, and area overhead compared to other works.


Subject(s)
Computer Security , Software , Algorithms , Computers , Software Design
2.
PLoS One ; 16(11): e0257679, 2021.
Article in English | MEDLINE | ID: mdl-34735459

ABSTRACT

Reverse engineering is a burning issue in Integrated Circuit (IC) design and manufacturing. In the semiconductor industry, it results in a revenue loss of billions of dollars every year. In this work, an area efficient, high-performance IC camouflaging technique is proposed at the physical design level to combat the integrated circuit's reverse engineering. An attacker may not identify various logic gates in the layout due to similar image output. In addition, a dummy or true contact-based technique is implemented for optimum outcomes. A library of gates is proposed that contains the various camouflaged primitive gates developed by a combination of using the metal routing technique along with the dummy contact technique. This work shows the superiority of the proposed technique's performance matrix with those of existing works regarding resource burden, area, and delay. The proposed library is expected to make open source to help ASIC designers secure IC design and save colossal revenue loss.


Subject(s)
Engineering/trends , Organization and Administration/standards , Security Measures/trends , Semiconductors , Humans , Industry/trends , Military Personnel
3.
PLoS One ; 16(11): e0259956, 2021.
Article in English | MEDLINE | ID: mdl-34784393

ABSTRACT

This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC). AES has been proved as the strongest symmetric encryption algorithm declared by USA Govt. and it outperforms all other existing cryptographic algorithms. Its hardware implementation offers much higher speed and physical security than that of its software implementation. Due to this reason, a number of AES cryptoprocessor ASIC have been presented in the literature, but the problem of testability in the complex AES chip is not addressed yet. This research introduces a solution to the problem for the AES cryptoprocessor ASIC implementing mixed-mode BIST technique, a hybrid of pseudo-random and deterministic techniques. The BIST implemented ASIC is designed using IEEE industry standard Hardware Description Language(HDL). It has been simulated using Electronic Design Automation (EDA)tools for verification and validation using the input-output data from the National Institute of Standard and Technology (NIST) of the USA Govt. The simulation results show that the design is working as per desired functionalities in different modes of operation of the ASIC. The current research is compared with those of other researchers, and it shows that it is unique in terms of BIST implementation into the ASIC chip.


Subject(s)
Computer Security/instrumentation , Algorithms , Computer Simulation , Industry , Pattern Recognition, Automated , United States
4.
PLoS One ; 16(10): e0257645, 2021.
Article in English | MEDLINE | ID: mdl-34634073

ABSTRACT

Renewable energy has become the most prominent source of energy to reduce carbon emissions around the globe. Undoubtedly, hydro energy is very much clean energy among other sources. In Bangladesh, hydro energy is available only in a specific southern area contributing several hundred megawatts to the national grid. This paper devotes to assessing the capacity and practicability of a hydropower plant to boost the power output by implementing the combined cycle hydropower system. The proposed method has been developed by 1) studying the existing plant based on surveyed data, 2) selecting the site for installing the hydrokinetic turbine, 3) designing with consideration of numerous constraints of inter dependability, and 4) creating a prototype model to ensure the practicability. Preliminary results show that a significant amount of additional electric energy can be generated from the plant with higher efficiency.


Subject(s)
Conservation of Natural Resources , Power Plants/trends , Renewable Energy , Sustainable Development/economics , Bangladesh , Electricity , Humans , Power Plants/economics
5.
PLoS One ; 10(10): e0138457, 2015.
Article in English | MEDLINE | ID: mdl-26491967

ABSTRACT

The performance of Advanced Encryption Standard (AES) mainly depends on speed, area and power. The S-box represents an important factor that affects the performance of AES on each of these factors. A number of techniques have been presented in the literature, which have attempted to improve the performance of the S-box byte-substitution. This paper proposes a new S-box architecture, defining it as ultra low power, robustly parallel and highly efficient in terms of area. The architecture is discussed for both CMOS and FPGA platforms, and the pipelined architecture of the proposed S-box is presented for further time savings and higher throughput along with higher hardware resources utilization. A performance analysis and comparison of the proposed architecture is also conducted with those achieved by the existing techniques. The results of the comparison verify the outperformance of the proposed architecture in terms of power, delay and size.


Subject(s)
Algorithms , Computer Security , Computer Simulation , Electricity , Semiconductors
SELECTION OF CITATIONS
SEARCH DETAIL
...