Paper 2019/059

BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption

Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, and Hai Zhou

Abstract

Cyclic logic encryption is newly proposed in the area of hardware security. It introduces feedback cycles into the circuit to defeat existing logic decryption techniques. To ensure that the circuit is acyclic under the correct key, CycSAT is developed to add the acyclic condition as a CNF formula to the SAT-based attack. However, we found that it is impossible to capture all cycles in any graph with any set of feedback signals as done in the CycSAT algorithm. In this paper, we propose a behavioral SAT-based attack called BeSAT. BeSAT observes the behavior of the encrypted circuit on top of the structural analysis, so the stateful and oscillatory keys missed by CycSAT can still be blocked. The experimental results show that BeSAT successfully overcomes the drawback of CycSAT.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Minor revision.Asian South Pacific Design Automation Conference
Keywords
logic encryptionSAT-based attackcyclic circuit
Contact author(s)
haizhou @ northwestern edu
History
2019-01-25: received
Short URL
https://ia.cr/2019/059
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/059,
      author = {Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou},
      title = {BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2019/059},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/059}},
      url = {https://eprint.iacr.org/2019/059}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.