Paper 2021/791

Open Sesame: A Novel Non-SAT-Attack against CAS-Lock

Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, and Rajat Subhra Chakraborty

Abstract

CAS-Lock (proposed in CHES2020), is an advanced logic locking technique that harnesses the concept of single-point function in providing SAT-attack resiliency. It is claimed to be powerful and efficient enough in mitigating state-of-the-art attacks against logic locking techniques. Despite the security robustness of CAS-Lock as claimed by the authors, we expose a serious vulnerability by exploiting the same and device a novel attack algorithm. The proposed attack can reveal the correct key by extracting the Distinguishing Input Patterns (DIPs) pertaining to a carefully chosen key simulation of the locked design. The correct key is obtained from the combination of elements from the set of extracted DIPs. Our attack is successful against various AND/OR cascaded-chain configurations of CAS-Lock and reports a 100% success rate in recovering the correct key.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. Minor revision.
Keywords
CAS-LockLogic LockingDistinguishing Input Pattern
Contact author(s)
akashdeepsaha95 @ gmail com
urbi ism @ gmail com
debdeep mukhopadhyay @ gmail com
rschakraborty @ gmail com
History
2021-06-14: received
Short URL
https://ia.cr/2021/791
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/791,
      author = {Akashdeep Saha and Urbi Chatterjee and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty},
      title = {Open Sesame: A Novel Non-SAT-Attack against CAS-Lock},
      howpublished = {Cryptology ePrint Archive, Paper 2021/791},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/791}},
      url = {https://eprint.iacr.org/2021/791}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.