Intellectual property protection for FPGA designs using the public key cryptography

被引:1
|
作者
Huang, Weihong [1 ,2 ]
Li, Renfa [1 ]
Xu, Jianbo [2 ]
Huang, Yin [3 ]
Hosam, Osama [4 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
[3] Xiamen Univ Technol, Coll Software Engn, Xiamen, Peoples R China
[4] IRI, City Sci Res & Technol Applicat, Alexandria, Egypt
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Intellectual property reuse; asymmetric encryption; intellectual property watermark; elliptic-curve cryptography; intellectual property security; IP PROTECTION; WATERMARKING; EFFICIENT; SCHEME;
D O I
10.1177/1687814019836838
中图分类号
O414.1 [热力学];
学科分类号
摘要
For the copyright protection in intellectual property reuse technology, we must ensure that when an intellectual property watermark verifier leaks the secret key of an intellectual property watermark system, a malicious attacker could not guess the key to facilitate successful attacks on the watermarks. Therefore, this work proposes a robust intellectual property watermarking algorithm based on elliptic-curve cryptography. The physical layout of intellectual property design is abstracted into a graph with tree structure by using the topology theory. A secure model based on the asymmetric encryption model is proposed to encrypt the watermark positions. The generated graph and a random searching algorithm are used for the distribution of the watermark positions. Finally, the watermarks are inserted by reordering the redundant attributes in the graph. The experiments show that the proposed algorithm will insert more watermark constraints under the same condition. Thus, the probability of coincidence is lower, achieving good reliability. In addition, when the watermarks are impaired due to attacks, the algorithm can restore the original watermarks from the topology graph. In comparison to other algorithms, the proposed algorithm has good performance in watermark capacity and overhead, as well as provides resilience to the typical attacks.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] FPGA design for algebraic tori-based Public-Key Cryptography
    Fan, Junfeng
    Batina, Lejla
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 2008, : 1134 - 1139
  • [22] Montgomery implantation of ECC over RSA on FPGA for Public Key Cryptography application
    Bhadada, Rajesh
    Sharma, Aditi
    PROCEEDINGS ON 2014 2ND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGY TRENDS IN ELECTRONICS, COMMUNICATION AND NETWORKING (ET2ECN), 2014,
  • [23] A protection mechanism for intellectual property rights (IPR) in FPGA design environment
    Adi, W
    Soudan, B
    Kassab, N
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 92 - 95
  • [24] INTELLECTUAL PROPERTY-RIGHTS PROTECTION IS THE KEY IN TELECOMMUNICATIONS CONVERGENCE
    BLENKIN, M
    SEARCH, 1995, 26 (05): : 139 - 139
  • [25] Distributed authentication in Kerberos using public key cryptography
    Sirbu, MA
    Chuang, JCI
    1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 134 - 141
  • [26] Public-key cryptography using paraunitary matrices
    Delgosha, Farshid
    Fekri, Faramarz
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
  • [27] Public Key Cryptography Using Harmony Search Algorithm
    Mitra, Suman
    Mahapatra, Gautam
    Balas, Valentina E.
    Chattaraj, Ranjan
    INNOVATIONS IN INFRASTRUCTURE, 2019, 757 : 1 - 11
  • [28] Public key cryptography using semigroup actions and semirings
    Atani, Reza Ebrahimi
    Atani, Shahabaddin Ebrahimi
    Mirzakuchaki, Sattar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (04): : 437 - 445
  • [29] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [30] Secure fingerprinting using public-key cryptography
    Yoshiura, H
    Sasaki, R
    Takaragi, K
    SECURITY PROTOCOLS, 1999, 1550 : 83 - 94