z-logo
open-access-imgOpen Access
Review on Logic Encryption Strategy Ensuring Key Interdependency
Author(s) -
M. Padmaa,
S. Divyadarshini,
M. Keerthana,
T.S. Mohana Parameswari,
K. Mohana Priya
Publication year - 2018
Publication title -
international journal of engineering and computer science
Language(s) - English
Resource type - Journals
ISSN - 2319-7242
DOI - 10.18535/ijecs/v7i3.09
Subject(s) - key (lock) , plan (archaeology) , computer science , encryption , computer security , outsourcing , interdependence , business , law , archaeology , marketing , political science , history
With the globalization of IC outline ow, numerous fables organizations outsource the creation of their plan to off-site foundries. As these foundries may not generally be believed, it brings about security vulnerabilities and dangers, for example, forging, IP theft, figuring out, overbuilding and Hardware Trojans. Logic encryption has developed to be a potential answer for secure the plan against these dangers. It presents some additional equipment (key-gates) into the plan to conceal the usefulness from unapproved clients, utilizing security keys. The areas of addition of key-gates decide the nature of the security gave by the subsequent plan. In this paper, we examined pros and cons of few papers and propose a productive technique to defeat the IP theft

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here