Homomorphic data isolation for hardware Trojan protection

M. Tarek Ibn Ziad, Amr Alanwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content. In this work, we suggest using homomorphism for Hardware Trojan protection. We implement two partial homomorphic designs based on El Gamal encryption/decryption scheme. The first design is a multiplicative homomorphic, whereas the second one is an additive homomorphic. We implement the proposed designs on a low-cost Xilinx Spartan-6 FPGA. Area utilization, delay, and power consumption are reported for both designs. Furthermore, we introduce a dual-circuit design that combines the two earlier designs using resource sharing in order to have minimum area cost. Experimental results show that our dual-circuit design saves 35% of the logic resources compared to a regular design without resource sharing. The saving in power consumption is 20%, whereas the number of cycles needed remains almost the same.

Original languageEnglish
Title of host publicationProceedings - IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015
PublisherIEEE Computer Society
Pages131-136
Number of pages6
ISBN (Electronic)9781479987184
DOIs
StatePublished - 27 Oct 2015
Externally publishedYes
EventIEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 - Montpellier, France
Duration: 8 Jul 201510 Jul 2015

Publication series

NameProceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI
Volume07-10-July-2015
ISSN (Print)2159-3469
ISSN (Electronic)2159-3477

Conference

ConferenceIEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015
Country/TerritoryFrance
CityMontpellier
Period8/07/1510/07/15

Keywords

  • ElGamal Encryption
  • Hardware Trojan
  • Homomorphism
  • Security

Fingerprint

Dive into the research topics of 'Homomorphic data isolation for hardware Trojan protection'. Together they form a unique fingerprint.

Cite this