Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

An Internet-based IP Protection Scheme for Circuit Designs using Linear Feedback Shift Register(LFSR)-based Locking Raju Halder1 , Parthasarathi Dasgupta2 , Saptarshi Naskar3 , Samar Sen Sarma3 1

Universit` a Ca’ Foscari di Venezia, Italy, [email protected] 2 Indian Institute of Management Calcutta, India 3 University of Calcutta, India

SBCCI’2009, Natal, RN, Brazil

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Intellectual Property (IP): Definition

Definition The pre-designed modules (ASIC/SOC ) are commonly called Intellectual Property (IP) or Virtual components (VC ). Advantages of IP: Reuse of the existing designs Meet the today’s time to market challenges Reduce effort and cost Designed, verified and used previously Reduce the possibility of failure of a block for the first time

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Definition Definition Process of embedding additional information (called watermark) into an artifact (text, image, video, audio) or piece of IP(hardware, software, algorithm, data organization) so that watermark can be detected or extracted to identify the author, the source, the used tools and techniques of the artifact or IP. Applications of Digital Watermarking: Ownership assertion Fingerprinting Copy prevention Fraud and tamper detection ID card security Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Encoding Function Figure: Watermark Encoding Function F(A,S)=A’

Original Artifact / IP (A)

F

Watermark Artifact / IP (A’)

Signature (S)

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Decoding Function Figure: Watermark Decoding Function D(A’,A)=S’

Artifact / IP under Inspection (A’)

Extracted Signature (S’) D

Original Artifact / IP (A)

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

Binary Decision x Cδ

Original Signature (S)

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Classification According to watermark: Spatial Frequency According to type of watermark: Text Image Vedio audio According to human perception: Invisible visible According to application: Source based Destination based Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Attacks and IP Protections Attacks against IP Watermarking: Removal attacks: Elimination attacks Masking attacks

Embedding attacks System attacks IP protection: Direct protection Indirect protection: Active Protection Passive Protection

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Attacks and IP Protections Attacks against IP Watermarking: Removal attacks: Elimination attacks Masking attacks

Embedding attacks System attacks IP protection: Direct protection Indirect protection: Active Protection Passive Protection

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Attacks and IP Protections Attacks against IP Watermarking: Removal attacks: Elimination attacks Masking attacks

Embedding attacks System attacks IP protection: Direct protection Indirect protection: Active Protection Passive Protection

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Attacks and IP Protections Attacks against IP Watermarking: Removal attacks: Elimination attacks Masking attacks

Embedding attacks System attacks IP protection: Direct protection Indirect protection: Active Protection Passive Protection

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Digital Watermarking: Attacks and IP Protections Attacks against IP Watermarking: Removal attacks: Elimination attacks Masking attacks

Embedding attacks System attacks IP protection: Direct protection Indirect protection: Active Protection Passive Protection

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Graphical Representation of a Digital System

How to represent a Digital System? Informally, any complex objects (digital computer) is a collection of objects (components), connected to form a coherent entity with a well-defined function or purpose. A natural and very useful way of modeling a system is a graph.

- J. P. Hayes. Computer Architecture and Organization. Tata Mc-graw Hill, 1996.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Graphical Representation of a Digital System

How to represent a Digital System? Informally, any complex objects (digital computer) is a collection of objects (components), connected to form a coherent entity with a well-defined function or purpose. A natural and very useful way of modeling a system is a graph.

- J. P. Hayes. Computer Architecture and Organization. Tata Mc-graw Hill, 1996.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Graphical Representation of a Digital System

How to represent a Digital System? Informally, any complex objects (digital computer) is a collection of objects (components), connected to form a coherent entity with a well-defined function or purpose. A natural and very useful way of modeling a system is a graph.

- J. P. Hayes. Computer Architecture and Organization. Tata Mc-graw Hill, 1996.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Linear Feedback Shift Register (LFSR): Definition Definition Series of connected Flip-Flops, with XOR feedback. They have no input except for clocks.

Features of LFSR:

+

Produce pseudorandom output sequence. Capable of doing Polynomial division.

0

1

0

0

clock

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

1

11100110100 …

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Linear Feedback Shift Register (LFSR) Characteristics and Reciprocal Characteristics Polynomial

LFSR is characterized by two types of polynomials: Characteristic polynomial: P(x) = 1 + Cm−1 x + Cm−2 x 2 + ... + C1 x m−1 + x m Reciprocal characteristic polynomial: P ∗ (x) = 1 + C1 x + C2 x 2 + ... + Cm−1 x m−1 + x m

+ Cm =1

+

Cm-1

+

Cm-2

C1

C0=1

output

Characteristic Reciprocal

1

x

xm

xm-1

x2

xm-1

xm-2

x

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

xm 1

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Linear Feedback Shift Register (LFSR) Maximum Length LFSR

Definition (Primitive Characteristic Polynomial:) It cannot be factored (i.e. it is prime), It is a factor of (i.e. can evenly divide) X N + 1, where N = 2L -1 and L=LFSR length. Definition (Maximum length LFSR:) Associated with a primitive characteristic polynomial. Produces an output sequence of length 2m -1 (called m-sequence) after which it repeats.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Linear Feedback Shift Register (LFSR) Maximum Length LFSR

Definition (Primitive Characteristic Polynomial:) It cannot be factored (i.e. it is prime), It is a factor of (i.e. can evenly divide) X N + 1, where N = 2L -1 and L=LFSR length. Definition (Maximum length LFSR:) Associated with a primitive characteristic polynomial. Produces an output sequence of length 2m -1 (called m-sequence) after which it repeats.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Intellectual Property (IP) Digital Watermark Graphical Representation Linear Feedback Shift Register (LFSR)

Linear Feedback Shift Register (LFSR): Properties

Properties of m-sequence: The number of 0s and 1s differs by one. It has (2m − 1) 1s and (2m−1 − 1) 0s . One run of m (consecutive) 1s and one run of m-1 (consecutive) 0s .

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Proposed scheme Design tool splits into two modules: 1 Module 1 : at creator’s end Watermark Creation Encryption of the design 2

Module 2 : at receiver’s end Decryption of the design Watermark Verification Design Graph

Design Graph

Internet

Watermarking + Encryption

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

Decryption + WM verification

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Figure: Flowchart of Watermark Creation System Graph G

Generate Polynomial g(x) Length of LFSR & Characteristics Polynomial

g(x) LFSR Embed Signature q(x), r(x)

gcs(x)

Concatenate gcs, qc, rc

Arbitrary seq. of bits

Binary form of Watermark W & Mask M Convert into decimal form

Watermark W & Mask M Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Signature (S)

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 1: Generate a polynomial g (x) from the design graph G : Degree of nodes No. of nodes of degree d Binary Coefficient of terms highest degree term g(x)

: : : : :

d c b=(d+c)%2 monic Σ b.xd

7 6 1 5

0

d nodes c b=(d+c)%2 0 ∅ 0 0 1 {1,7} 2 1 2 {5,4} 2 0 3 {3,6} 2 1 4 {0,2} 2 0 Polynomial g(x)= Σb.x d

4 2 3

0

1

2

3

=x +x +x

4

Co-efficient of g(x) = gc = 01011 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

3

= 0.x + 1.x + 0.x + 1.x + 1.x

IP Protection Scheme for Circuit Designs

4

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 1: Generate a polynomial g (x) from the design graph G : Degree of nodes No. of nodes of degree d Binary Coefficient of terms highest degree term g(x)

: : : : :

d c b=(d+c)%2 monic Σ b.xd

7 6 1 5

0

d nodes c b=(d+c)%2 0 ∅ 0 0 1 {1,7} 2 1 2 {5,4} 2 0 3 {3,6} 2 1 4 {0,2} 2 0 Polynomial g(x)= Σb.x d

4 2 3

0

1

2

3

=x +x +x

4

Co-efficient of g(x) = gc = 01011 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

3

= 0.x + 1.x + 0.x + 1.x + 1.x

IP Protection Scheme for Circuit Designs

4

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 1: Generate a polynomial g (x) from the design graph G : Degree of nodes No. of nodes of degree d Binary Coefficient of terms highest degree term g(x)

: : : : :

d c b=(d+c)%2 monic Σ b.xd

7 6 1 5

0

d nodes c b=(d+c)%2 0 ∅ 0 0 1 {1,7} 2 1 2 {5,4} 2 0 3 {3,6} 2 1 4 {0,2} 2 0 Polynomial g(x)= Σb.x d

4 2 3

0

1

2

3

=x +x +x

4

Co-efficient of g(x) = gc = 01011 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

3

= 0.x + 1.x + 0.x + 1.x + 1.x

IP Protection Scheme for Circuit Designs

4

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 2: Apply g(x) to LFSR and Produce quotient q(x) and remainder r(x): Polynomial of graph G Coefficient of g(x) quotient obtained from LFSR Coefficient of q(x) remainder contained in LFSR Coefficient of r(x)

: : : : : :

g(x) gc q(x) qc r(x) rc

g(x) = x + x 3 + x 4 gc = 01011 0

gc =01011 g(x)=x+x2+x4

+

0

0 +

qc=01000 q(x)=x

After Processing: q(x)= x qc = 01000 r(x)= 0 rc = 000

rc = 000 r(x) = 0

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 2: Apply g(x) to LFSR and Produce quotient q(x) and remainder r(x): Polynomial of graph G Coefficient of g(x) quotient obtained from LFSR Coefficient of q(x) remainder contained in LFSR Coefficient of r(x)

: : : : : :

g(x) gc q(x) qc r(x) rc

g(x) = x + x 3 + x 4 gc = 01011 0

gc =01011 g(x)=x+x2+x4

+

0

0 +

qc=01000 q(x)=x

After Processing: q(x)= x qc = 01000 r(x)= 0 rc = 000

rc = 000 r(x) = 0

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation

Step 3: Compute gcs = Sc ⊗ gc Binary representation of Signature Coefficient of g(x)

: Sc : gc

Sc = 0100111 gc = 01011 gcs = Sc ⊗ gc = 0001011

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 4: Create Watermark W and Mask M by concatenating gcs , qc , rc and arbi , i=0,...,3. gcs qc rc arbi , i=0,..,3

: : : :

gc ⊗ Sc co-efficient of quotient polynomial co-efficient of remainder polynomial arbitrary bit strings

gcs = 0001011 arb0 = 010

qc = 01000

arb1 = 100

arb2 = 01

rc = 000 arb3 = 10011

W = arb0 + qc + arb1 + rc + arb2 + start bit + gcs + end bit + arb3 = 010 + 01000 + 100 + 000 + 01 + 1 + 0001011 + 1 + 10011 = 010010001000000110001011110011 = Hex/Decimal representation ∗

M = arb0 + qc + arb1 + rc + arb2 + {0 of length (start bit + gcs + end bit)} + arb3 = 010010001000000100000000010011 = Hex/Decimal representation

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation Step 4: Create Watermark W and Mask M by concatenating gcs , qc , rc and arbi , i=0,...,3. gcs qc rc arbi , i=0,..,3

: : : :

gc ⊗ Sc co-efficient of quotient polynomial co-efficient of remainder polynomial arbitrary bit strings

gcs = 0001011 arb0 = 010

qc = 01000

arb1 = 100

arb2 = 01

rc = 000 arb3 = 10011

W = arb0 + qc + arb1 + rc + arb2 + start bit + gcs + end bit + arb3 = 010 + 01000 + 100 + 000 + 01 + 1 + 0001011 + 1 + 10011 = 010010001000000110001011110011 = Hex/Decimal representation ∗

M = arb0 + qc + arb1 + rc + arb2 + {0 of length (start bit + gcs + end bit)} + arb3 = 010010001000000100000000010011 = Hex/Decimal representation

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Creation: Completeness

Suppose, G = Design Graphs, L = Maximum Length LFSRs, S = Signatures, Wgsl = Watermarks of g ∈ G with s ∈ S using l ∈ L. Lemma ∀g1 , g2 ∈ G , ∀l1 , l2 ∈ L and ∀s ∈ S: Wgl11 s 6= Wgl22 s if l1 6= l2

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Verification Figure: Flowchart of Watermark Verification W

M

G

Apply Masking

Generate Polynomial

gcs Extract signature g(x)

Signature S

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark Verification

Step 1: Compute gcs from W ⊗ M: Watermark Mask Watermark Mask

: W : M : W = Hex/Decimal representation = 010010001000000110001011110011 : M = Hex/Decimal representation = 010010001000000100000000010011

gcs = W ⊗ M = 000000000000000010001011100000 = 100010111 = 0001011

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark verification Step 2: Generate polynomial g (x) from the design graph G : g (x) = x + x 3 + x 4 gc = 01011 Step 3: Obtain signature S from gc ⊗ gcs : gcs = 0001011 gc = 01011 Signature S = gcs ⊗ gc = 0001011 ⊗ 01011 = 0100111 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark verification Step 2: Generate polynomial g (x) from the design graph G : g (x) = x + x 3 + x 4 gc = 01011 Step 3: Obtain signature S from gc ⊗ gcs : gcs = 0001011 gc = 01011 Signature S = gcs ⊗ gc = 0001011 ⊗ 01011 = 0100111 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Watermark verification

Step 4: Match the signatures. Make decision If matched, claim := true else claim := false. Transmitted watermark Created watermark at buyer end

: Wt = 0100111 : Wb = 0100111

Claim := true

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Outline 1

Preliminaries Intellectual Property (IP) Digital Watermark Graphical Representation of a Digital System Linear Feedback Shift Register (LFSR)

2

Proposed Scheme Watermark Creation and Verification Encryption and Decryption of the Design

3

Complexity Analysis and Robustness

4

Summery of Result

5

Conclusions and Future Works

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design The example inputs are: Design Graph G = (V , E ). Private Key kb =ENCRYPTION. Private Linear Feedback Shift Register (LFSR) of length L=5.

Figure: Design Graph G = (V , E )

Figure: LFSR of length 5

7 +

6 1 0

5

0

1

0

0

1

4 2 3

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Figure: Flowchart of Encryption Length of LFSR & Characteristics Polynomial Private Key Kb Sub Key K2 Generate sub-key

Determine h0

Sub Key K1 Generate Seed Value h0

Seed value LFSR

Initialize LFSR Initialized LFSR

α

Generate a part of m - sequence Rand o/p sequence Generate set of edges to be modified in Gm Edge set

System Graph Gm

Complement edge set in Gm

Encrypted graph G’m

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

Generate hash value

Hash value hL

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Step 1: Generate the seed value for LFSR from the private key kb Step 1(a): Convert kb into kb0 : length(kb0 )=d L8 e Partition kb into n partitions pi : ∀i = 1, .., n : length(pi ) = length(kb0 ) length(kb0 ) = d 85 e = 1 (E)(N)(C)(R)(Y)(P)(T)(I)(O)(N)=(5)(14)(3)(18)(25)(16)(20)(9)(15)(14).

Perform aj0 = (Σaj,i mod 26 +1) where j = 1, ..., length(p1 ) and i = 1, ..., n j=1, i=1,...,10 a10 = a1,1 + .. + a1,10 =(5+14+3+18+25+16+20+9+15+14) mod 26 + 1 = 139 mod 26 + 1 = 10 = ’J’

kb0 = a10 a20 ...aj0 where j = 1, ..., length(p1 ) kb0 =’J’ Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Step 1: Generate the seed value for LFSR from the private key kb Step 1(a): Convert kb into kb0 : length(kb0 )=d L8 e Partition kb into n partitions pi : ∀i = 1, .., n : length(pi ) = length(kb0 ) length(kb0 ) = d 85 e = 1 (E)(N)(C)(R)(Y)(P)(T)(I)(O)(N)=(5)(14)(3)(18)(25)(16)(20)(9)(15)(14).

Perform aj0 = (Σaj,i mod 26 +1) where j = 1, ..., length(p1 ) and i = 1, ..., n j=1, i=1,...,10 a10 = a1,1 + .. + a1,10 =(5+14+3+18+25+16+20+9+15+14) mod 26 + 1 = 139 mod 26 + 1 = 10 = ’J’

kb0 = a10 a20 ...aj0 where j = 1, ..., length(p1 ) kb0 =’J’ Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Step 1: Generate the seed value for LFSR from the private key kb Step 1(a): Convert kb into kb0 : length(kb0 )=d L8 e Partition kb into n partitions pi : ∀i = 1, .., n : length(pi ) = length(kb0 ) length(kb0 ) = d 85 e = 1 (E)(N)(C)(R)(Y)(P)(T)(I)(O)(N)=(5)(14)(3)(18)(25)(16)(20)(9)(15)(14).

Perform aj0 = (Σaj,i mod 26 +1) where j = 1, ..., length(p1 ) and i = 1, ..., n j=1, i=1,...,10 a10 = a1,1 + .. + a1,10 =(5+14+3+18+25+16+20+9+15+14) mod 26 + 1 = 139 mod 26 + 1 = 10 = ’J’

kb0 = a10 a20 ...aj0 where j = 1, ..., length(p1 ) kb0 =’J’ Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Step 1: Generate the seed value for LFSR from the private key kb Step 1(a): Convert kb into kb0 : length(kb0 )=d L8 e Partition kb into n partitions pi : ∀i = 1, .., n : length(pi ) = length(kb0 ) length(kb0 ) = d 85 e = 1 (E)(N)(C)(R)(Y)(P)(T)(I)(O)(N)=(5)(14)(3)(18)(25)(16)(20)(9)(15)(14).

Perform aj0 = (Σaj,i mod 26 +1) where j = 1, ..., length(p1 ) and i = 1, ..., n j=1, i=1,...,10 a10 = a1,1 + .. + a1,10 =(5+14+3+18+25+16+20+9+15+14) mod 26 + 1 = 139 mod 26 + 1 = 10 = ’J’

kb0 = a10 a20 ...aj0 where j = 1, ..., length(p1 ) kb0 =’J’ Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Step 1: Generate the seed value for LFSR from the private key kb : Step 1(b): kb0 = a10 a20 ...aj0 binary string = ascii(a10 )|ascii(a20 )|...|ascii(aj0 )

kb0 = ”J” binary string = 01001010 Step 1: Generate the seed value for LFSR from the private key kb : Step 1(c): seed value= first L bit of the binary string

L=5 binary string = 01001010 seed value = 01001 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Step 1: Generate the seed value for LFSR from the private key kb : Step 1(b): kb0 = a10 a20 ...aj0 binary string = ascii(a10 )|ascii(a20 )|...|ascii(aj0 )

kb0 = ”J” binary string = 01001010 Step 1: Generate the seed value for LFSR from the private key kb : Step 1(c): seed value= first L bit of the binary string

L=5 binary string = 01001010 seed value = 01001 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Step 1: Generate the seed value for LFSR from the private key kb : Step 1(b): kb0 = a10 a20 ...aj0 binary string = ascii(a10 )|ascii(a20 )|...|ascii(aj0 )

kb0 = ”J” binary string = 01001010 Step 1: Generate the seed value for LFSR from the private key kb : Step 1(c): seed value= first L bit of the binary string

L=5 binary string = 01001010 seed value = 01001 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Step 1: Generate the seed value for LFSR from the private key kb : Step 1(b): kb0 = a10 a20 ...aj0 binary string = ascii(a10 )|ascii(a20 )|...|ascii(aj0 )

kb0 = ”J” binary string = 01001010 Step 1: Generate the seed value for LFSR from the private key kb : Step 1(c): seed value= first L bit of the binary string

L=5 binary string = 01001010 seed value = 01001 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design: Valid Seed Value

Lemma The method of generating the seed value as described above guarantees the presence of at least one 1 in the seed value for L ≥ 2.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Step 2: Initialize √ LFSR with seed value and generate output sequence upto length 2 × α × N, (N=no. of nodes in G): √ α=0.5 and No. of nodes=N=8 and 2 × α × N=11 Output sequence obtained from LFSR (seed value 01001) is 11100110100

+

0

1

0

0

1

11100110100 …

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design: Randomness of output

Lemma

√ The sequence of length 2 × α × N, where 0 < α < 1 and N = |V | which is taken from the m-sequence of a maximum-length LFSR of length L must be completely random.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design

Step 3: Taking the index (starting from 0) of 0s and 1s in the sequence form two sets S1 and S2 : In our example, S1 = {3, 4, 7, 9, 10} and S2 = {0, 1, 2, 5, 6, 8} Step 4: Perform ”p mod N” over S1 and S2 , where p ∈ S1 , S2 and N=no. of nodes in N: In our example, S1 = {3, 4, 7, 1, 2} and S2 = {0, 1, 2, 5, 6}

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design

Step 3: Taking the index (starting from 0) of 0s and 1s in the sequence form two sets S1 and S2 : In our example, S1 = {3, 4, 7, 9, 10} and S2 = {0, 1, 2, 5, 6, 8} Step 4: Perform ”p mod N” over S1 and S2 , where p ∈ S1 , S2 and N=no. of nodes in N: In our example, S1 = {3, 4, 7, 1, 2} and S2 = {0, 1, 2, 5, 6}

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Step 5: Cross Product S1 and S2 In our example, S1 = {3, 4, 7, 1, 2} and S2 = {0, 1, 2, 5, 6} S = S1 × S2 = {(3,0), (3,1), (3,2), (3,5), (3,6), (4,0), (4,1), (4,2), (4,5), (4,6), (7,0), (7,1), (7,2), (7,5), (7,6), (1,0), (1,1), (1,2), (1,5), (1,6), (2,0), (2,1), (2,2), (2,5), (2,6)} Step 6: Remove the edges e ∈ G ∧ e ∈ S and insert the edges e 6∈ G ∧ e ∈ S: 7

6 1 0

3 5 4 2

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design: Guarantee of two set formation

Lemma

√ The sequence of length 2 × α × N, where 0 < α < 1 and N = |V | must be greater than L (length of LFSR) to include at least one 1 and one 0 so as to enable the formation of two sets.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption of the Design Generation of Hash Value Concatenate rows from adjacency matrix Split the binary sequence into blocks Use Merkle-Damgards meta method to get hash value

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Decryption of the Design Figure: Flowchart of Decryption Length of LFSR & Characteristics Polynomial Private Key Kb Sub Key K2 Generate sub-key

Determine h0

Sub Key K1 Generate Seed Value Seed value LFSR

h0

Initialize LFSR Initialized LFSR

α

Generate a part of m - sequence Rand o/p sequence Generate set of edges to be modified in G’m Edge set

Encrypted Graph G’m

Complement edge set in G’m

G’’m

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

Generate hash value h’L Compare

Not tampered

IP Protection Scheme for Circuit Designs

hL

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Decryption of the Design Step 1: Using same procedure as in encryption generate cross-product of two sets: S1 = {3, 4, 7, 1, 2} and S2 = {0, 1, 2, 5, 6} S = S1 × S2 = {(3,0), (3,1), (3,2), (3,5), (3,6), (4,0), (4,1), (4,2), (4,5), (4,6), (7,0), (7,1), (7,2), (7,5), (7,6), (1,0), (1,1), (1,2), (1,5), (1,6), (2,0), (2,1), (2,2), (2,5), (2,6)} Step 2: Remove the edges e ∈ G ∧ e ∈ S and insert the edges e 6∈ G ∧ e ∈ S: 7 6 1 5

0 4

2 3 Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Watermark Creation and Verification Encryption and Decryption

Encryption and Decryption: Complexity

Lemma Assuming encryption of a graph Gm to be a function E (Gm ), E (E (Gm )) = Gm . Lemma The best case and worst case time complexities of encryption and decryption are O(N) and O(N 2 ) respectively, where N is the number of vertices in G.

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Time Complexity Private Parameters used by the Seller: The private key Kb of the seller. The length L of the LFSR and the feedback equation for the maximum-length LFSR. The value of α. Time Complexity: If key Kb is not known to the intruder then number of possible seed values for initializing LFSR is O(2L ). If the feedback equation is not known to the intruder, then the number of possible feedback equations for maximum length LFSR is O(2L ).

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Time Complexity Private Parameters used by the Seller: The private key Kb of the seller. The length L of the LFSR and the feedback equation for the maximum-length LFSR. The value of α. Time Complexity: If key Kb is not known to the intruder then number of possible seed values for initializing LFSR is O(2L ). If the feedback equation is not known to the intruder, then the number of possible feedback equations for maximum length LFSR is O(2L ).

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Time Complexity Private Parameters used by the Seller: The private key Kb of the seller. The length L of the LFSR and the feedback equation for the maximum-length LFSR. The value of α. Time Complexity: If key Kb is not known to the intruder then number of possible seed values for initializing LFSR is O(2L ). If the feedback equation is not known to the intruder, then the number of possible feedback equations for maximum length LFSR is O(2L ).

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Time Complexity Private Parameters used by the Seller: The private key Kb of the seller. The length L of the LFSR and the feedback equation for the maximum-length LFSR. The value of α. Time Complexity: If key Kb is not known to the intruder then number of possible seed values for initializing LFSR is O(2L ). If the feedback equation is not known to the intruder, then the number of possible feedback equations for maximum length LFSR is O(2L ).

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Time Complexity Private Parameters used by the Seller: The private key Kb of the seller. The length L of the LFSR and the feedback equation for the maximum-length LFSR. The value of α. Time Complexity: If key Kb is not known to the intruder then number of possible seed values for initializing LFSR is O(2L ). If the feedback equation is not known to the intruder, then the number of possible feedback equations for maximum length LFSR is O(2L ).

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Summery of Results Figure: CPU times for encryption and decryption vs. no. of vertices

For α=0.0001

Time(Sec)

150 100

User Encryption Time(Sec)

50

User Decryption Time(Sec)

53 39 5 69 42 9

32 49 8 45 92 6 51 30 9

23 13 6 27 50 7 29 34 7

12 75 2 19 60 1

0

No. of Nodes N

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Summery of Results Figure: CPU times for watermark creation and verification vs. number of vertices

User WM Creation Time(Sec) User WM Verification Time

12 75 2 19 60 1 23 13 6 27 50 7 29 34 7 32 49 8 45 92 6 51 30 9 53 39 5 69 42 9

Time(Sec)

For LFSR length=10 7 6 5 4 3 2 1 0

No. of Nodes N

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Conclusions and Future Works Conclusions: An Internet-based scheme Ensures both direct and indirect IP protection Watermarking and Encryption both are performed This scheme uses LFSR Can be applied on Generic Design Graph

Future Works: Scheme has scope of improvement in terms of Embedding the watermark within the input graph Using public-private key combinations

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Conclusions and Future Works Conclusions: An Internet-based scheme Ensures both direct and indirect IP protection Watermarking and Encryption both are performed This scheme uses LFSR Can be applied on Generic Design Graph

Future Works: Scheme has scope of improvement in terms of Embedding the watermark within the input graph Using public-private key combinations

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

Preliminaries Proposed Scheme Complexity Analysis and Robustness Summery of Result Conclusions and Future Works

Thank You all !

Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar,Samar Sen Sarma

IP Protection Scheme for Circuit Designs

An Internet-based IP Protection Scheme for Circuit ...

Conclusions and Future Works. An Internet-based IP Protection Scheme for. Circuit Designs using Linear Feedback Shift. Register(LFSR)-based Locking.

895KB Sizes 0 Downloads 194 Views

Recommend Documents

A Fault Detection and Protection Scheme for Three ... - IEEE Xplore
Jan 9, 2012 - remedy for the system as faults occur and save the remaining com- ponents. ... by the proposed protection method through monitoring the flying.

an anonymous watermarking scheme for content ... - CiteSeerX
to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing .... content that a buyer purchases, a passive ad- .... 2004) is a special type of signature scheme that can be used to ...

an anonymous watermarking scheme for content ... - CiteSeerX
Trusted Computing (TC) is a technology that has been developed to enhance the ..... 3G/GPRS. Broadcast. WLAN. Network. Technologies. Devices. Service and Content. Providers. User ? ... ual authentication for wireless devices. Cryptobytes,.

SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -VI.pdf
Try one of the apps below to open or edit this item. SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -VI.pdf. SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -VI.

Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-VIIIth.pdf
Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-VIIIth.pdf. Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-VIIIth.pdf. Open. Extract. Open with. Sign In. Main menu.

Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-IInd.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -III.pdf
Try one of the apps below to open or edit this item. SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -III.pdf. SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -III.

Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-VIth.pdf
Try one of the apps below to open or edit this item. Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-VIth.pdf. Scheme-SVITS-CSE-IP-(B.tech+M.Tech)-CCE-VIth.

SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -II.pdf
... Engineering Drawing 60 20 20 30 20 3 0 4 5 150. 4 IBTCS204 Computer Peripherals and. Interfaces 60 20 20 0 50 3 1 2 5 150. 5 IBTEE102 Fundamentals of ...

SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -VII.pdf
SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -VII.pdf. SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -VII.pdf. Open. Extract. Open with. Sign In. Main menu.

SCHEME-SVITS-CSE-IP(B.Tech.+M.Tech.)-CSE -II.pdf
Examination Scheme Teaching Scheme/Week. CREDITS. TOTAL MARKS. THEORY PRACTICAL. Th T P. Page 1 of 1. SCHEME-SVITS-CSE-IP(B.Tech.

An Adaptive Network Coded Retransmission Scheme for Single-Hop ...
869. An Adaptive Network Coded Retransmission Scheme for Single-Hop Wireless Multicast Broadcast Services. Sameh Sorour, Student Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE. Abstract—Network coding has recently attracted attention as a s

Toward an Optimal Fusion Scheme for Multisource ...
boosted decision trees and support vector machines (SVM) for ... Cloud forest 60% of the native flora is found in CF ... 2.3 Support vector machine method.

An optimal explicit time stepping scheme for cracks ...
of element degrees of freedom (in space and time as the crack is growing); ...... Réthoré J., Gravouil A., Combescure A. (2004) Computer Methods in Applied.

An Integrated Resource Allocation Scheme for Multi-Tenant Data-center
Index Terms—Data-center, resources, bandwidth ... simultaneous VDCs hosted in a physical data-center, with all ..... call this a two-grouping of size {N − M,M}.

A 1-V High-Speed Mtcmos Circuit Scheme for Power ...
On the process side, the sub- ... This paper proposes a new circuit scheme to preserve data ... registers and the pipeline registers also preserve data during.

Circuit for controlling arc energy from an electrosurgical generator
Dec 4, 2003 - a user of the electrosurgical generator to “dial” in preferred levels of tissue vaporization and thermal spread. With these embodiments, the ...

A Speculative Control Scheme for an Energy-Efficient Banked ... - Scale
energy, and delay numbers from detailed circuit layouts in. Section 3. We present ..... have explored alternative designs for implementing a large ..... Technology.

A Speculative Control Scheme for an Energy-Efficient ...
The trend toward simulta- ... approaches retain a centralized microarchitecture, but divide ..... remove the conflict by setting enable signals such that a local port ...

an anonymous watermarking scheme for content ...
Chevening/Royal Holloway Scholarship, and the Eu- ... minimises reliance on a TTP for privacy protection as ... privacy enhancing mechanisms to protect their.

A Circuit Representation Technique for Automated Circuit Design
automated design, analog circuit synthesis, genetic algorithms, circuit .... engineering workstations (1996 Sun Ultra), we present evolved circuit solutions to four.