Paper 2014/109

Diffusion Programmable Device : The device to prevent reverse engineering

Mitsuru Shiozaki, Ryohei Hori, and Takeshi Fujino

Abstract

The secret information, which is embedded in integrated circuit (IC) devices such as a smart card, has the risk of theft by reverse engineering (RE). The circuit design of IC can be stolen by the RE, and the counterfeit can be illegally fabricated. Therefore, the secure IC device requires the circuit architecture protected from the RE attacks. This paper proposes the diffusion programmable device (DPD) architecture as a countermeasure against the RE. A look-up table circuit based on the DPD can generate desired logic function without changing the layout except diffusion layer. And, the logic function can be programmed by assigning the N-type or P-type dopant to a part of active region. A test chip using the DPD-LUT was prototyped with a 180nm CMOS technology. And, operations of vaious logic functions such as AND, OR, XOR and XNOR were confirmed through experiments.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Reverse engineeringCountermeasureDiffusion programmable device (DPD)
Contact author(s)
mshio @ fc ritsumei ac jp
History
2014-02-15: received
Short URL
https://ia.cr/2014/109
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/109,
      author = {Mitsuru Shiozaki and Ryohei Hori and Takeshi Fujino},
      title = {Diffusion Programmable Device : The device to prevent reverse engineering},
      howpublished = {Cryptology ePrint Archive, Paper 2014/109},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/109}},
      url = {https://eprint.iacr.org/2014/109}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.