Security Analysis of Cryptographical Module for FPGA

Article Preview

Abstract:

FPGA has been used abroad all fields about space, military, auto. It is the best choose of cipher protocol and arithmetic achievement. Its security has been concerned. In this article the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3842-3844

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mohammad Tehranipoor, Farinaz Koushanfar. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design and Test of Computers.

DOI: 10.1109/mdt.2010.7

Google Scholar

[2] Harrini Bhamidipati. Single Trojan Injection Model Generation And Detection. Case Western Reserve University.

Google Scholar

[3] Miodrag Potkonjak, Ramesh Karri. Special Issue on Integrated Circuit and System Security. IEEE Transactions on Information Forensics and Security.

Google Scholar

[4] Thomas Feller, Aziz Demirezen. HARDWARE TROJANS: Data Leakage Using General Purpose LEDs. Technical Report - TUD-CS-2010-2384.

Google Scholar

[5] Zhang Peng, Zou Cheng. Hardware Trojans design of correlation analysis based on electric. Journal of Huazhong University of Science and Technology (Natural Science Edition).

Google Scholar