Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
REDUCED OVERHEAD GATE LEVEL LOGIC ENCRYPTION
Document Type and Number:
WIPO Patent Application WO/2017/123305
Kind Code:
A2
Abstract:
There are several approaches to encrypting circuits: combination logic encryption, encrypted gate topologies, transmission gate topologies, and key expansion of gate topologies. Each of these may encrypt a circuit with certain advantages in delay and power consumption.

Inventors:
JURETUS KYLE (US)
SAVIDIS IOANNIS (US)
Application Number:
PCT/US2016/058393
Publication Date:
July 20, 2017
Filing Date:
October 24, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
UNIV DREXEL (US)
JURETUS KYLE (US)
SAVIDIS IOANNIS (US)
International Classes:
H01L27/085; H04L9/12
Attorney, Agent or Firm:
SCHOTT, Stephen, B. (US)
Download PDF:
Claims:
CLAIMS

1. A circuit having a gate topology comprising:

a logical gate with integrated key transistors that render the circuit functional or not functional depending on inputs provided to the key transistors.

2. The circuit having a gate topology of claim 1 , wherein the key transistors comprise at least a PMOS stack and an NMOS stack, and wherein:

the PMOS stack comprises a first PMOS having an input A and a second PMOS switch having an input B wherein both the first and second PMOS switches have sources to a voltage source and drains that serve as a source to a third PMOS switch, wherein the PMOS switch also receives in input KEYO and a drain that outputs OUT; and

the NMOS stack comprises a first NMOS switch having the input A and a second NMOS switch having the input B, wherein both the first and second NMOS switches have sources to ground and drains that serve as a source to a third NMOS switch, wherein the NMOS switch also receives in input KEYO and a drain that connects to the output OUT;

wherein input of a correct input KEYO outputs a correct output OUT, rendering the circuit functional, and input of an incorrect input KEYO outputs an incorrect output OUT, rendering the circuit not functional.

3. The circuit having a gate topology of claim 2, wherein when the KEYO is set to 0, the PMOS stack is activated allowing the gate topology to act as a NAND gate.

4. The circuit having a gate topology of claim 2, wherein when the KEYO is set to 1 , the NMOS stack is activated allowing the gate topology to act as a NOR gate.

5. The circuit having a gate topology of claim 2, wherein depending on a value of the KEYO, one or the other of the PMOS stack and NMOS stack is activated while the other one of the PMOS stack and NMOS stack does not generate an output OUT.

6. The circuit having a gate topology of claim 2, further comprising a shared functionality between the gates such that depending on a value of input A and input B, the PMOS stack and NMOS stack share functionality between their first and second switches.

7. The circuit having a gate topology of claim 2, further comprising a shared functionality when both input A and input B are set to VDD, the NMOS stack is connected to ground and has a drain connected to another NMOS with the input A.

8. The circuit having a gate topology of claim 2, further comprising a shared functionality when both input A and input B are set to ground, the PMOS stack is connected to VDD and has a drain connected to another PMOS with the input A.

9. A circuit having a gate topology comprising:

a plurality of transmission gates that receive key inputs, wherein the plurality of transmission gates perform a logical function based on the key inputs, and based on the logical function, the circuit is functional or not functional.

10. A circuit encrypted with a transmission gate topology that allows or prohibits the circuit from functioning, the transmission gate topology comprising:

a transmission gate one with a key input KEYO, input A, input A_BAR, and drain to output OUT;

a transmission gate two in parallel with transmission gate one and having a key input KEYO, input B, input B_BAR, and drain to output OUT; and

a transmission gate three with a key input KEYl , input A, input A_BAR, and drain to a transmission gate four that is in series with transmission gate three and has an input B, input B_BAR, and output OUT;

wherein when a correct value is applied to either input A or input B, a value of KEYO or KEYl is passed through the transmission gate topology to OUT.

1 1. The circuit encrypted with a transmission gate topology of claim 10, wherein the correct value of 1 and when the correct value of 1 is applied to input A and input B, the value of KEY1 is passed through the transmission gate topology to OUT.

12. The circuit encrypted with a transmission gate topology of claim 1 1 , wherein the correct value of 0 and when the correct value of 0 is applied to input A and input A, the value of KEYO is passed through the transmission gate topology to OUT.

13. The circuit encrypted with a transmission gate topology of claim 10, wherein the transmission gate one comprises a PMOS that receives the input A and an NMOS that receives the input A_BAR.

1 . The circuit encrypted with a transmission gate topology of claim 10, wherein the transmission gate two comprises a PMOS that receives the input B and an NMOS that receives the input B_BAR.

15. The circuit encrypted with a transmission gate topology of claim 1 , wherein the transmission gate three comprises PMOS that receives the input A and an NMOS that receives the input A_BAR.

16. The circuit encrypted with a transmission gate topology of claim 15, wherein the transmission gate four comprises a PMOS that receives the input B and an NMOS that receives the input B_BAR.

Description:
Reduced Overhead Gate Level Logic Encryption BACKGROUND

[0001] The use of integrated circuits (ICs) in many applications that benefit society including banking, transportation, energy, health, and the military, continues to expand. While use in such fields presents potential benefits, the increasing reliance on third-parties has introduced security and reliability concerns. One concern is the increasing reliance on third-party foundries, as in-house fabrication facilities in advanced technologies cost in excess of $5 billion US dollars. Since a third-party foundry has access to the IC design, typically in the GDS-II format, and has the required tools and knowledge to reverse engineer a design from the GDS-II file alone, utilizing an untrusted third-party foundry presents threats to an IC.

[0002] An untrusted third-party foundry is capable of intellectual property (IP) theft, IC counterfeiting, IC overproduction, and the insertion of malicious circuitry (hardware Trojans). Counterfeiting and piracy were expected to cause losses of $ 1.7 trillion dollars in 2015, and a 2008 analysis conducted by SEMI estimated an IP revenue loss of $4 billion dollars to the IC industry alone. While the monetary concerns of utilizing untrusted third parties are significant, a greater danger is the use of ICs that do not meet the original specifications required for the target application. ICs that do not meet specifications cause increased failure rates and produce logical errors. In addition, there is a potential risk of malicious hardware Trojans being embedded within the ICs. Hardware Trojans inserted into the IC aim to deny service, steal information, and/or cause incorrect functionality. Even with methods to detect hardware Trojans, there is the possibility that the Trojan executes without the knowledge of the end-user of the circuit. An area of research that has emerged to reduce the security risks of IP theft, IC

counterfeiting, IC overproduction, and hardware Trojan insertion is logic encryption.

[0003] Logic encryption adds additional circuitry (key gates) to a design in order to hide the functionality from an adversary. Without the application of the correct input key, the IC will not function correctly. Essentially, a malicious foundry no longer possesses all of the information to reverse engineer the entire design, making it more difficult to steal the IP, counterfeit the IC, produce extra ICs, and even insert hardware Trojans, as the adversary is not certain what effects the ICs correct functionality has on the Trojan.

[0004] One security measure that aims to prevent IP theft, IC counterfeiting and overproduction, and the insertion of hardware Trojans is logic encryption. Logic encryption exists in both sequential and combinational methodologies. Sequential logic encryption typically involves the application of a required sequence before correct circuit operation (normal mode) is achieved. An example of sequential logic encryption is shown in FIG. 1A, where the sequence of P0, PI , and P2 must be entered in obfuscated mode before the IC operates correctly, otherwise the circuit is rendered not functional.

[0005] Combinational logic encryption adds key gates to the circuit, requiring the adversary to determine the key before functionality is obtained. In addition,

combinational logic encryption changes the logic within the circuit, creating additional obfuscation over sequential logic encryption and therefore providing an advantage against IP theft. Without the key, it is also more difficult for an adversary to counterfeit or overproduce an IC, as the functionality of the circuit is unknown. Logic encryption also prevents the insertion of hardware Trojans, as the entire design is no longer known to an adversary, making it more difficult to insert a Trojan without causing unintended actions that are more readily detected.

[0006] While combinational logic encryption provides a method to increase IC security against a multitude of threats, current logic encryption techniques result in high overheads in performance, power, and area.

[0007] Some logic encryption may use XOR gates (or a gate of similar functionality) or replaces the original gate with a look-up table (LUT) utilizing a 4x1 MUX. While XOR or LUT based implementations offer a means to increase security, the per-gate area, power, and performance overhead are high. In order to utilize the security benefits of logic encryption in a wide array of IC applications, the per-gate overhead must be reduced

SUMMARY OF THE EMBODIMENTS

[0008] There are several approaches to encrypting circuits: combination logic encryption, encrypted gate topologies, transmission gate topologies, and key expansion of gate topologies. Each of these may encrypt a circuit with certain advantages in delay and power consumption.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009] FIG. 1 shows logic encryption with use of an XOR gate.

[0010] FIG. 1 A shows a modified state transmission graph.

[001 1] FIG. 2 shows logic encryption with the use of a 4X1 multiplexor.

[0012] FIG. 3 shows a stack-based topology implementing a NAND or NOR gate depending on a value of KEY0.

[0013] FIG. 4 shows a transmission gate based topology implementing an

AND /NAND depending on the values of KEY0 and KEY1.

[0014] FIG. 5 shows key expansion using a net KE as a standard key input.

[0015] FIG. 6 shows a key expansion topology with two NAND/AND gate level logic encryption.

[0016] FIG. 7 shows a controllable path insertion to mask key expansion.

[0017] FIG. 8 shows a two level transmission gate topology for AND/NAND.

[0018] FIGS. 9-12 show variations of the two level transmission gate topology.

DETAILED DESCRIPTION OF THE EMBODIMENTS

[0019] 1. Combinational Logic Encryption

[0020] Combinational logic encryption alters the logic structure by requiring a key to enable the correct operation of the IC. Two logic encryption techniques may include: 1) the use of XOR XNOR gates and 2) the insertion of a LUT as a gate replacement. A technique based on the insertion of 2x1 MUXes may also be possible. The inputs to the 2x1 MUX include the correct input and a net that carries the negated logical value of the correct input. The key input is the select signal of the 2x1 MUX. Finding a net that consistently negates the desired output is challenging and limits the use of the 2x1 MUX in logic encryption. An overview of the implementation of the XOR and LUT based logic encryption techniques follows.

[0021] 1.1 XOR Based Encryption [0022] FIG. 1 shows an illustration of a case of adding an XOR gate 100 following an AND gate 1 10 to implement a key input. When key input KEY0 is 1 , the XOR gate 100 behaves as an inverter and when KEY0 is 0, the XOR acts as a buffer. Therefore, when KEY0 is 1 , an incorrect value is obtained on OUT0. To deter adversaries from knowing the key based on the implementation of the key gate (i.e. an XOR XNOR gate), inverters may be added in select locations, essentially inverting the key. The additional inverters, however, may add overhead on top of the overhead already incurred to implement the key gate itself.

[0023] 1.2. LUT Based Encryption

[0024] A look-up table may also implement a key gate. A 4x1 MUX structure 200 that is able to encrypt the functionality of a single gate is shown in FIG. 2.

[0025] Instead of the single key value KEY0, the key values 210 are passed to the inputs of the 4x1 MUX, which sets the functionality of the gate. Using a 4x1 MUX structure allows for the realization of any 2-input function 220 as opposed to the simple inversion provided by the XOR gate. Note that the illustration in FIG. 2 does not include any memory elements attached to the inputs of the 4x1 MUX, as memory is not explicitly required to encrypt the functionality of a gate. If memory is used in a design, the per-gate encryption overhead increases drastically.

[0026] In a solution such as the one of FIG. 2, the original gate may be completely replaced, leaving little information pertaining to the original functionality. The masked functionality of a gate encrypted with the LUT technique is dissimilar to the XOR based logic encryption method, which may require additional inverters to mask the key value, as described above.

[0027] 2. Overhead of Logic Encryption

[0028] The XOR and LUT based logic encryption techniques both hinder the ability of a malicious actor to use an IC, but the per-gate overheads of both may be high. An analysis of the performance, power, and area penalties associated with encrypting a standard logic gate for both methods may be found in this application. Note that for the cost analysis, no inverters were added after the XOR encryption gates, and no memory elements were used for the LUT based approach. The values provided for the per-gate overhead of each method are therefore highly optimistic as compared to implementations that include the inverters and memory.

[0029] In overhead testing, an IBM 180 nm process design kit with a standard drive strength for each gate to test the overhead associated with each technique. Table 1 shows an analysis of the propagation delay, power, and area of standard cells.

[0030] Table 1

[0031] The drive strength of the encrypted and original gate were matched, and each drove a load capacitance of 5fF. Table 2 shows an analysis of the propagation delay, power, and area of XOR based logic encryption. Per-gate overheads are provided as percent increases over the standard cell values listed in Table 1 .

[0032] Table 2

[0033] Similarly, the overheads of the LUT based logic encryption method are listed in Table 3, which shows an analysis of the propagation delay, power, and area of 4x1 MUX based logic encryption. Per-gate overheads are provided as percent increases over the standard cell values listed in Table I.

[0034] Table 3

[0035] The overheads in terms of power, area, and performance observed in Tables 2 and 3 limit the use of such techniques in many applications. The large overhead for per gate encryption limits the acceptable signal paths to place gates without decreasing performance. In addition, the total number of encrypted gates placed in a circuit may be limited by power and area constraints.

[0036] 3. Encrypted Gate Topologies

[0037] Gate level encryption may provide alternatives in the circuits shown in FIG. 1 and 2. Looking at the FIG. 1 circuit; to encrypt the AND gate 1 10, an additional XOR gate 100 is added to the output of the AND. The additional XOR gate may increase the delay, area, and power consumption of the circuit. Similarly, logic encryption that uses 4x1 MUXes adds a large area overhead and creates additional levels of logic that decreases performance, as listed in Table 3. Instead of inserting an extra gate in the logic path, as the XOR encryption method does, or using a large the 4x1 MUX technique does, gate level designs with embedded security capabilities may reduce the overhead associated with previous logic encryption implementations.

[0038] 3.1 Stack-based Topology

[0039] FIG. 3 shows a stack-based topology 300 implementing a NAND or NOR gate depending on the value of KEY0. When KEY0 is 0, the PMOS stack 310 is activated allowing the gate to behave as a NAND. When KEY0 is set to 1 , the NMOS stack 320 is activated allowing the gate to behave as a NOR. The benefit of such a topology is that one of the stacks is essentially disconnected from OUT, limiting the capacitance connected to OUT during execution, which reduces power consumption and limits the degradation in performance.

[0040] The stack configuration 300 includes a shared functionality 330 between the implemented logic of the gates. For example, a NAND and NOR gate share the same output for two of the four input combinations of A and B. Having shared functionality eliminates the need for an additional transistor with a key input, such as when A and B are 0. Eliminating a transistor for certain input combinations reduces the area and power consumption, as well as reducing the number of transistors in series in the stack, which further degrades performance. The NAND /NOR stack-based gate also has another important characteristic: the ability to forgo negated input logic. While the NAND/NOR configuration does not require negated logic, most designs implementing the stack-based topology do, as the ability to turn-on both PMOS and NMOS logic requires both logic high and logic low.

[00 1] The stack-based topology may be used when all the input combinations do not require the generation of an incorrect output when an incorrect key is applied. If, however, applying an incorrect key requires the generation of an incorrect output for all input combinations, such as the case when using the XOR based technique, the stack- based topology is not as beneficial as more power and area are required.

[0042] Reviewing the stack-based topology shown in FIG. 3 with specificity, there is a PMOS stack 310, an NMOS stack 320, both of which may be considered as key transistors, and a block of shared functionality 330 between the NAND and NOR functional descriptions. The NMOS stack 320 comprises two NMOS transistors (or switches) 322, 324, each with source to ground 326, and a drain that serves as the source to a third NMOS transistor 328. The first NMOS transistor 322 receives an input A and the second NMOS transistor 324 receives an input B. The third NMOS transistor 328 receives an input KEYO and its drain connects to the output, labeled OUT, of the gate.

[0043] Similarly, the PMOS stack 310 comprises two PMOS transistors 312, 314, each with source to voltage drain VDD, which in this example is 1.8V, and a drain that serves as the source to a third PMOS transistor 316. The first PMOS transistor 312 in the stack gate topology receives an input A and the second PMOS transistor 314 receives an input B. The third PMOS transistor 316 in the PMOS stack 310 receives an input KEYO and the drain connects to the output, labeled OUT, of the gate.

[0044] The shared functionality 330 between the NAND and NOR gates is applicable when inputs A and B are both ground or VDD. The shared functionality 330 when both A and B are set to VDD includes an NMOS with source connected to ground and drain connected to another NMOS with the input supplied by A. The NMOS with input A has the drain connected to the output of the gate OUT. The shared functionality when both A and B are set to ground includes a PMOS with source connected to VDD and drain connected to another PMOS with the input supplied by A. The PMOS with input A has the drain connected to the output of the gate OUT.

[0045] 3.2 Transmission Gate Topology

[0046] The key value is passed through the transmission gates to reduce the impact on the area and performance of the replicated logic. Therefore, the total number of transistors and the transistors the key values pass through may be reduced. With the key value passed through the transmission gates, the circuit 400 shown in FIG. 4 may be better suited to replicate the XOR based method. If logic low is applied to either input A or input B the value of KEYO is passed to OUT. Similarly, when input A and input B are both logic high the value of key input KEY1 is passed to OUT.

[0047] A similar circuit may be used to produce an OR/NOR gate by inverting the A and B inputs to the transmission gates. Such a modification passes the value of KEYO when input A or B is logic high, and passes the value of KEY 1 when inputs A and B are both low.

[0048] Two keys are not necessary, as KEYO and KEY1 are simply the inversion of one another when implementing a AND NAND gate or OR/NOR gate. However, using two distinct keys allows for key expansion, which relies on the constant 0 and 1 functions that are generated from the transmission gate topology shown in FIG. 4 when KEYO and KEYl are both 0 or 1 , respectively. Generating a constant 0 or 1 on the output line allows for the use of either value (0 or 1) as a key input while connecting inputs A and B to arbitrary nets within the circuit. An adversary now has a more difficult task to determine the key nets in a circuit and render the circuit functional, and must apply more key combinations to decipher the correct key.

[0049] The encryption of an XOR or XNOR gate or other logical gates may be more complex. The logic of an XOR or XNOR logical gate does not include the same logic minimization that an AND, OR, NAND, or NOR gate possess. While AND, OR, NAND, and NOR gates all include simplifications that reduce the number of transistors required to implement the function, the only simplification that is possible for the XOR or XNOR gates is to eliminate one of the key inputs. The number of keys is therefore reduced for a single gate from four to three by tying KEYl and KEY2 together to form a single key input, as shown in FIG. 2. Reducing the number of key bits required per gate is important if there is a strict area and power overhead requirement.

[0050] The transmission gate topology shown in FIG. 4 includes logic to supply KEYO to the gate output OUT when input A or B is connected to ground and logic to pass KEYl to OUT when inputs A and B are both connected to VDD. The logic passing the value of KEYO to OUT may use two parallel paths. The upper path through transmission gate one 410 connects KEYO to one terminal of a PMOS (PMOS switch) 412 shorted with one terminal of an NMOS (NMOS switch) 414 that form the transmission gate one 410. The PMOS 412 and NMOS 414 receive inputs A and A_BAR, respectively. The PMOS 412 and NMOS 414 each have a second terminal shorted together that connects to the output OUT of the gate 410. The lower path passing through transmission gate two 420 connects KEYO to one terminal of a PMOS 422 shorted with one terminal of an NMOS 424 to form a second transmission gate 420. The PMOS 422 and NMOS 424 receive inputs B and B_BAR, respectively. The PMOS 422 and NMOS 424 each have a second terminal shorted together that connects to the output OUT of the gate 420. [0051] The logic that connects KEY1 to the output node includes KEY1 applied to one terminal of a PMOS 432 shorted with one terminal of an NMOS 434 that form a transmission gate three 430. The PMOS 432 and NMOS 434 receive inputs A_BAR and A, respectively. The second shorted terminal connection of the PMOS and NMOS transistors 432, 434 is connected to one terminal of a PMOS 442 shorted with one terminal of an NMOS 444 that form transmission gate four 440. The PMOS 442 and NMOS 444 receive inputs B_BAR and B, respectively. The PMOS 442 and NMOS 444 of transmission gate four 440 each have a second terminal shorted together that connects to the output OUT of the gate.

[0052] 4. Evaluation of Power, Area, and Performance

[0053] The drive strengths of the encrypted cells were matched with those of the XOR and LUT based logic encryption techniques. In order to match the drive strength, an inverter was added to the output of both the stack and transmission gate topologies. The functionality of the stack-based design is therefore an AND/OR gate as opposed to a NAND/NOR. The improvements over the XOR and LUT based encryption techniques are listed in Tables 4, 5, and 6. The improvement in performance is described as a reduction in propagation delay. The power is based on the average power of each gate. The area improvement is based on an area estimate determined from a non-optimized layout of the encryption gates as compared with layouts of the XOR and LUT encryption methods.

[0054] The results demonstrate the ability of gate level logic encryption to lower the overheads in area, power, and performance. The reductions in overhead provide more flexibility in the potential placement and quantity of encrypted gates within an IC design.

[0055] Table 4 shows propagation delay, power, and area analysis of the AND/OR implemented with stack-based encryption. Percent improvements over XOR and LUT logic encryption are listed.

[0056] Table 5 shows propagation delay, power, and area analysis of the

NAND/AND implemented with transmission gate encryption. Percent improvements over XOR and LUT logic encryption are listed.

[0057] Table 5

[0058] Table 6 shows propagation delay, power, and area analysis of the NOR/OR implemented with transmission gate encryption. Percent improvements over XOR and LUT logic encryption are listed.

[0059] Table 6

[0060] Encrypting an AND gate with the transmission gate topology results in a power reduction of 43.2%, an estimated area reduction of 19.8%, and a performance increase of 46.9% as compared to an XOR based implementation. Similar improvements are achieved with the stack-based topology, demonstrating that gate level logic encryption is an effective technique to mask circuit functionality while lowering the implementation cost of securing an IC from IP theft and attack.

[0061] 5. Key Expansion

[0062] The transmission gate topology shown in FIG. 5 has the ability to output a constant logic low or a constant logic high independent of the inputs A and B. The number of key combinations an adversary must consider effectively doubles when using the constant outputs of the transmission gate topology, while still achieving the reduction in overhead provided by gate level logic encryption. The ability to use the constant outputs to expand the key search space of an adversary is coined key expansion. What follows are circuit topologies that use the constant low and constant high output of the transmission gate logic encryption family to force an adversary to consider a larger key search space.

[0063] 5.1 Key Expansion: Transmission Gate Topology

[0064] Key expansion may be successfully included into a circuit when the expanded key appears to be a standard case of logic encryption. As a result, one encrypted gate may not be directly connected to the key input of another encrypted gate. FIG. 5 shows the first topology that encrypts the input keys, where the net labeled KE represents the key expanded net. For the topology shown in FIG. 5, A and B are inputted from nearby nets, providing the appearance that the encrypted gate is a NAND or AND. However, when KEY0 is equal to KEY1 , a constant value is generated on KE, essentially replicating the XOR based encryption technique. The topology shown in FIG. 5 also functions when the XOR gate is replaced by another standard gate such as an AND or OR. For the case that the XOR is replaced with an OR, if a controlling value is generated on KE, then OUT0 is a corrupted version of the output of the OR gate.

[0065] Another topology that allows for key expansion is shown in FIG. 6. The output of a gate level logic encryption instance is connected to one of the logical inputs of another encrypted instance. The topology appears to be a standard logical connection within the circuit, however, key expansion is implemented by holding the KE net constant. When KE is held at a constant high, OUT0 is either C, the inversion of C, a constant 0, or a constant 1 depending on the values of KEY2 and KEY3. The

AND/NAND structure no longer functions as an AND/NAND gate, forcing an adversary to explore more key input combinations.

[0066] The topology shown in FIG. 7 is an expanded use case of the topology in FIG. 6. Instead of directly connecting the output of one encrypted gate to another, a controllable path that includes a 4 lh input D within the circuit is used to disguise the use of key expansion. The modified circuit makes it more difficult for an adversary to associate the given topology with key expansion.

[0067] While the presented key expansion topologies present opportunities to use the constant output cases of the transmission gate logic encryption, the overheads of the topologies are larger than a standard encrypted gate. As such, a circuit may include the budget for the implementation of the XOR or LUT based logic encryption techniques. For example, the c432 ISCAS benchmark implemented with the fault-based XOR logic encryption technique has a performance overhead of approximately 10%, a power overhead of 55%, and an area overhead of 57%. Although the impact on performance requires further investigation, the use of gate level logic encryption reduces the power overhead to an estimated 32.3% and the area overhead to 45.7% for the same implementation. The 22.7% difference in the power overhead and 1 1.3% difference in the area overhead are available for key expansion. The reduced overhead of gate level logic encryption permits the addition of key expansion to further increase the key combinations an adversary must search while maintaining a similar overhead budget to current methodologies.

[0068] 5.2 Key Expansion: Transmission Gate Topology Expanded

[0069] The transmission gate topology can be expanded to encrypt multiple gates by realizing logic simplifications similar to an AND-OR-invert (AOI), which may be reliant on the controllability of the inputs. Fig. 8 shows the transmission gate structure with the addition of two 2x1 MUX structures to allow for 12 two gate logic configurations, shown in Table 7.

[0070] Table 7

[0071] This topology may implement 16 logical functions when functions not realized by two standard gates are considered, such as a constant logic high or logic low output. Such a structure provides the potential to reduce overhead while expanding the obfuscated area of a circuit. The OR/NOR transmission gate topology may also be used as the initial gate in any of the following topologies as well.

[0072] If overhead is a concern, other two level logic structures may be realized by eliminating one, or both, of the 2x1 MUX structures. FIG. 9 shows a configuration capable of realizing eight logic functions with the removal of the lower 2x1 MUX from the topology shown in FIG. 8. Such a topology is able to implement functions 1 , 6, 7, and 8 from Table 7. Functions 3, 4, 9, and 10 could also be implemented by switching the configuration to what is shown in FIG. 10.

[0073] FIG. 8 shows two level transmission gate topology 800 for AND /NAND followed by any standard two input gate with signal C connected to the remaining input. The two level transmission gate topology shown in FIG. 8 may include logic to supply KEY0 to the gate output when input A or B is connected to ground and C is connected to ground, logic to pass KEY1 to OUT when input A or B is connected to ground and C is connected to VDD, logic to pass KEY2 when inputs A and B are connected to VDD and C is connected to ground, and logic to pass KEY3 when inputs A and B are connected to VDD and C is connected to VDD.

[0074] The path beginning with KEY0 connects one terminal of a PMOS 812 shorted with one terminal of an NMOS 814 that form a first transmission gate 810. The PMOS 812 and NMOS 814 of the first transmission gate 810 receive inputs C and C_BAR, respectively. The PMOS 812 and NMOS 814 each have a second terminal shorted together that connects to the shorted terminal of two PMOS transistors 822, 832 and two NMOS transistors 824, 834, with each PMOS/NMOS pair forming an additional second and third transmission gate 820, 830. The PMOS and NMOS transistors 822, 832, 824, 834 of the second and third transmission gates 820, 830 receive inputs A and A_BAR and B and B_BAR, respectively. Both the second and third transmission gates 820, 830 include PMOS and NMOS transistors 822, 832, 824, 834 each with a second terminal shorted together that connects to the output OUT of the gate.

[0075] The path beginning with KEY1 connects one terminal of a PMOS 842 shorted with one terminal of an NMOS 844 that form transmission gate four 840 with inputs C_BAR and C, respectively. The PMOS 842 and NMOS 844 of the fourth transmission gate 840 then have terminal connections that connect to the input terminal of the second and third transmission gates 820, 830 with inputs A and A_BAR and B and B_BAR, respectively. The PMOS 822, 832 and NMOS 824, 834 transistors from the second and third transmission gates 820, 830 are then shorted to form a terminal connection to the output OUT of the gate.

[0076] The path beginning with KEY2 connects to the terminal of a PMOS 852 and NMOS 854 with inputs C and C_BAR, respectively, that forms a fifth transmission gate 850. The fifth transmission gate 850 then connects to the terminal of a PMOS 862 and NMOS 864 to form sixth transmission gate 860, with inputs A_BAR and A, respectively. The sixth transmission gate 860 then connects to the terminals of a PMOS 872 and a NMOS 874 transistor that form a seventh transmission gate 870 with inputs B_BAR and B, respectively. The terminals from the seventh transmission gate 870 then connect to the output of the gate, labeled OUT.

[0077] The path beginning with KEY3 connects to the shorted terminal of a

PMOS 882 and NMOS 884 with inputs C and C_BAR, respectively, that form an eighth transmission gate 880. The eighth transmission gate 880 then connects to the shorted terminal of a PMOS 862 and NMOS 864 that form the sixth transmission gate 860, with inputs A_BAR and A, respectively. The sixth transmission gate 860 then connects to the shorted terminals of a PMOS 872 and a NMOS 874 transistor that form the seventh transmission gate 870 with inputs B_BAR and B, respectively. The terminals from the seventh transmission gate 870 then connect to the output of the gate, labeled OUT.

[0078] FIG. 9 shows two level transmission gate topology capable of implementing functions 1 , 6, 7, and 8 from Table 7. For sake of clarity transmission gate reference numbering from the topology in FIG. 8 have been repeated in FIGS. 9-12, and similar gates are referred to as transmission gate one and transmission gate two with reference to FIGS. 9-12 in place of first and second transmission gates in FIG. 8.

[0079] The two level transmission gate topology 900 shown in FIG. 9 may use logic to supply KEY0 to the gate output when input A or B is connected to ground and C is connected to ground, logic to pass KEY1 to OUT when input A or B is connected to ground and C is connected to VDD, and logic to pass KEY2 when inputs A and B are connected to VDD.

[0080] The path beginning with KEY0 connects to the terminal of a PMOS 812 and NMOS 814 to form the transmission gate one 810 with inputs C and C_BAR, respectively. The transmission gate one 810 is then connected to the terminals of a PMOS 822 and NMOS 824 forming the transmission gate two 820 with inputs A and A_BAR, respectively. The transmission gate one 810 also connects to another PMOS 832 and NMOS 834 with shorted terminals, forming the transmission gate three 830, with inputs B and B_BAR to the PMOS and NMOS transistors, respectively. Both

transmission gates two and three 820, 830 short the second PMOS and NMOS terminals 822, 824, 832, 834 to the output OUT of the gate.

[0081] The path beginning with KEY1 connects to the shorted terminals of a PMOS 842 and NMOS 844 with inputs C_BAR and C, respectively, forming the transmission gate four 840. The transmission gate four 840 connects to two pairs of shorted PMOS and NMOS terminals 822, 824, 832, 834, forming the transmission gates two and three 820, 830, with inputs A and A_BAR and B and B_BAR, respectively. The second terminals of the PMOS and NMOS transistors 822, 824, 832, 834 in both the transmission gates two and three 820, 830 are then connected to the output of the gate OUT.

[0082] The logic that connects KEY2 to the output node consists of KEY2 applied to one terminal of a PMOS 862 shorted with one terminal of an NMOS 864 that form the transmission gate six 860. The PMOS 862 and NMOS 864 receive inputs A_BAR and A, respectively. The second shorted terminal connection of the PMOS 872 and NMOS 874 transistors is connected to one terminal of a PMOS shorted with one terminal of an NMOS that form the transmission gate seven 870. The PMOS and NMOS of transmission gate seven 870 receive inputs B_BAR and B, respectively. The PMOS 872 and NMOS 874 of the transmission gate seven 870 of the bottom path each have a second terminal shorted together that connects to the output OUT of the gate.

[0083] FIG. 10 shows two level transmission gate topology 1000 capable of implementing functions 3, 4, 9, and 10 from Table 7. The topology 1000 is similar to the topology 800 in FIG. 8 but without the first and second gates 810, 820.

[0084] The two level transmission gate topology 1000 shown in FIG. 10 may use logic to supply KEY0 to the gate output when input A or B is connected to ground, logic to pass KEYl to OUT when input A and B are connected to VDD and C is connected to ground, and logic to pass KEY2 when inputs A and B are connected to VDD and C is connected to VDD.

[0085] The upper path connects KEY0 to one terminal of a PMOS 822 shorted with one terminal of an NMOS 824 that form a transmission gate two 820. The PMOS 822 and NMOS 824 receive inputs A and A_BAR, respectively. The PMOS 822 and NMOS 824 each have a second terminal shorted together that connects to the output OUT of the gate 820. The lower path passing through transmission gate three 820 connects KEY0 to one terminal of a PMOS 832 shorted with one terminal of an NMOS 834. The PMOS 832 and NMOS 834 receive inputs B and B_BAR, respectively. The PMOS 832 and NMOS 834 each have a second terminal shorted together that connects to the output OUT of the gate.

[0086] The path beginning with KEYl connects the terminal of a PMOS 852 and NMOS 854 to form transmission gate five 850 with inputs C and C_BAR, respectively. Transmission gate five 850 is then connected to the shorted terminals of a PMOS 862 and a NMOS 864 forming transmission gate six 860 with inputs A and A_BAR, respectively. The second shorted terminal connection of the PMOS 862 and NMOS 864 transistors of transmission gate six 860 is connected to one terminal of a PMOS 872 shorted with one terminal of an NMOS 874 that form transmission gate seven 870. The PMOS 872 and NMOS 874 of transmission gate seven 870 receive inputs B_BAR and B, respectively. The second shorted terminals of transmission gate seven 870 connect to the output OUT of the gate.

[0087] The path beginning with KEY2 shorts the terminal of a PMOS 882 with the terminal of a NMOS 884 to form transmission gate eight 880 with inputs C_BAR and C, respectively. The PMOS 882 and NMOS 884 then have another shorted connection that connects to a shorted PMOS 882 and NMOS 882 terminal, creating transmission gate six 860, with inputs A_BAR and A, respectively. The second shorted terminal connection of the PMOS 862 and NMOS 864 transistors of transmission gate six 860 is connected to one terminal of a PMOS 872 shorted with one terminal of an NMOS 874 that form transmission gate seven 870. The PMOS 872 and NMOS 874 of transmission gate seven 870 receive inputs B_BAR and B, respectively. The second shorted terminals of transmission gate seven 870 connect to the output OUT of the gate.

[0088] Finally, the original transmission gate topology 800 may be used in the configurations 1 100, 1200 shown in FIGS. 1 1 and 12 to realize two logic functions. The topology 1 100 shown in FIG. 1 1 may be capable of implementing functions 1 and 6 from Table 7, while the topology 1200 shown in FIG. 12 is able to implement functions 3 and 4. Such a scenario would be best suited for applications where overhead is the primary concern and the number of obfuscated functions is not as much of a concern.

[0089] FIG. 1 1 shows two level topology capable of implementing functions 1 and 6 from Table 7.

[0090] The transmission gate topology shown in FIG. 1 1 includes logic to supply input C to the gate output OUT, when input A or B is connected to ground and logic to pass KEY1 to OUT when inputs A and B are both connected to VDD.

[0091] The logic passing the value of C to OUT includes two parallel paths. The upper path through transmission gate two 820 connects C to one terminal of a PMOS 822 shorted with one terminal of an NMOS 824. The PMOS 824 and NMOS 824 receive inputs A and A_BAR, respectively. The PMOS 822 and NMOS 824 each have a second terminal shorted together that connects to the output OUT of the gate 820. The lower path passing through transmission gate three 830 connects C to one terminal of a PMOS 832 shorted with one terminal of an NMOS 834 to form a transmission gate three 830. The PMOS 832 and NMOS 834 receive inputs B and B_BAR, respectively. The PMOS 832 and NMOS 834 each have a second terminal shorted together that connects to the output OUT of the gate 830.

[0092] The logic that connects KEYO to the output node consists of one terminal of a PMOS 862 shorted with one terminal of an NMOS 864 that form a transmission gate six 860. The PMOS 862 and NMOS 864 receive inputs A_BAR and A, respectively. The second shorted terminal connection of transmission gate six 860 is connected to one terminal of a PMOS 872 shorted with one terminal of an NMOS 874 that form

transmission gate seven 870. The PMOS 872 and NMOS 874 receive inputs B_BAR and B, respectively. The PMOS 872 and NMOS 874 of transmission gate seven 870 each have a second terminal shorted together that connects to the output OUT of the gate 870.

[0093] FIG. 12 shows two level topology 1200 capable of implementing functions 3 and 4 from Table 7.

[0094] The transmission gate topology 1200 shown in FIG. 12 may use logic to supply input KEYO to the gate output OUT when input A or B is connected to ground and logic to pass C to OUT when inputs A and B are both connected to VDD.

[0095] The logic passing the value of KEYO to OUT may use two parallel paths. The upper path connects KEYO to one terminal of a PMOS 822 shorted with one terminal of an NMOS 824 that form transmission gate two 820. The PMOS 822 and NMOS 824 receive inputs A and A_BAR, respectively. The PMOS 822 and NMOS 824 each have a second terminal shorted together that connects to the output OUT of the gate 820. The lower path passing through transmission gate three 830 connects KEYO to one terminal of a PMOS 832 shorted with one terminal of an NMOS 834 to form a transmission gate three 830. The PMOS 832 and NMOS 834 receive inputs B and B_BAR, respectively. The PMOS 832 and NMOS 834 each have a second terminal shorted together that connects to the output OUT of the gate.

[0096] The logic that connects C to the output node includes C applied to one terminal of a PMOS 862 shorted with one terminal of an NMOS 864 that form

transmission gate six 860. The PMOS 862 and NMOS 864 receive inputs A_BAR and A, respectively. The second shorted terminal connection of transmission gate six 860 is connected to one terminal of a PMOS 872 shorted with one terminal of an NMOS 874 that form transmission gate seven 870. The PMOS 872 and NMOS 874 receive inputs B_BAR and B, respectively. The PMOS 872 and NMOS 874 of transmission gate four each have a second terminal shorted together that connects to the output OUT of the gate 870.

[0097] While the invention has been described with reference to the embodiments above, a person of ordinary skill in the art would understand that various changes or modifications may be made thereto without departing from the scope of the claims.