Advanced Encryption Techniques for the Prevention of Reverse Engineering of the Programming Code in Military and Space Custom ICs and FPGAs

Award Information
Agency:
Department of Defense
Branch
Missile Defense Agency
Amount:
$99,994.00
Award Year:
2006
Program:
STTR
Phase:
Phase I
Contract:
HQ0006-06-C-7515
Award Id:
78099
Agency Tracking Number:
B064-008-0076
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
4775 Centennial Avenue Suite 130, Colorado Springs, CO, 80919
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
619085371
Principal Investigator:
PaulEaton
Chief Engineer
(505) 507-1390
paul.eaton@micro-rdc.com
Business Contact:
MaryDyson
Director Business Operations
(505) 507-4844
mary.dyson@micro-rdc.com
Research Institute:
ARIZONA STATE UNIV.
Lawrence Clark
Research & Sponsored Projects
Tempe, AZ, 85287
(480) 727-0295
Nonprofit college or university
Abstract
We propose the development of advanced encryption techniques to make integrated circuits more secure against unauthorized intrusion, specifically the use of innovative embedded techniques to make reprogramming of high performance deep sub-micron or nano-scale FPGA or custom ASIC systems by other than the intended recipient essentially impossible. The specific concerns addressed in this proposal regard the use of ICs having strategic importance, e.g., radiation hardened FPGAs, gate arrays, and other devices, being used by potential aggressors. As discussed in this overview, we are developing a methodology that is algorithmically robust since we make the worst-case assumption that the algorithm used to protect the device will be known or discovered by an attacker (e.g., through methodical reverse engineering). Such "deconstruction" has become common in the IC industry to the point where it is a routine part of competitive analysis at large IC manufacturers. Services are commercially available and deconstruction reports are available online for a fee. This makes the logic of any device available to any potential aggressor with sufficient resources. Consequently, a level of security that makes use of the devices themselves more expensive than fabricating copies is sufficient.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government