Publication | Closed Access
BeSAT
50
Citations
18
References
2019
Year
Unknown Venue
Hardware SecurityFeedback CyclesCryptographic PrimitiveEngineeringData Encryption StandardInformation SecurityCryptanalysisComputer EngineeringFormal MethodsCryptosystemComputer ScienceBlock CipherFormal VerificationData SecurityCryptographyCyclic Logic Encryption
Cyclic logic encryption is newly proposed in the area of hardware security. It introduces feedback cycles into the circuit to defeat existing logic decryption techniques. To ensure that the circuit is acyclic under the correct key, CycSAT is developed to add the acyclic condition as a CNF formula to the SAT-based attack. However, we found that it is impossible to capture all cycles in any graph with any set of feedback signals as done in the CycSAT algorithm. In this paper, we propose a behavioral SAT-based attack called BeSAT. Be-SAT observes the behavior of the encrypted circuit on top of the structural analysis, so the stateful and oscillatory keys missed by CycSAT can still be blocked. The experimental results show that BeSAT successfully overcomes the drawback of CycSAT.
| Year | Citations | |
|---|---|---|
Page 1
Page 1