A cipher where text is encrypted by shifting it based on the value of a key.
Caesar Cipher
A class of PUF where every unique challenge elicits a unique response.
What is a Strong PUF?
A power analysis technique that does not involve complex statistical analysis or processing, and instead focuses on the heuristics of a circuit’s power consumption.
Simple Power Analysis
Q. A Hardware Trojan detection technique is implemented by transitioning between states in a FSM until the correct sequence of transitions occurs.
What is Sequential Logic Locking?
Q. A malicious activity that may occur when overproduced ICs are illicitly sold or IC design files are copied/stolen and used to produce parts for the black-market.
What is IP Counterfeiting & Cloning?
Cryptography scheme where the same key used to encrypt messages can be used to decrypt messages.
What is Symmetric Cryptography
Q. A PUF that is implemented by racing competing signals across a chain of MUXs to measure physical delay within a circuit.
What is an Arbiter PUF.
A power analysis technique that involves measuring and collecting many traces of a circuit’s power consumption and then processing these traces to observe changes between different inputs to the circuit.
What is Differential Power Analysis
Q. A Hardware Trojan detection technique that only allows a circuit to function correctly when supplied with a correct constant input or ‘key’.
What is an example of combinational logic locking?
Q. The ratio of the number of ‘good’ chips and ‘bad’ or defective chips produced by a manufacturer.
What is yield?
DES uses Transformation, Permutation, and this to encrypt Plaintext messages.
What is substitution / sbox?
Q. A PUF that is implemented using competing timer or counter circuits to measure physical delay within a circuit.
What is a Ring Oscillator PUF.
Analysis where the underlying circuit is not destroyed in the process of analysis, and may continue to be used afterwards, Side Channel Analysis (SCA) is classified as this.
What is non-invasive analysis.
Q. An anti-piracy technique is commonly implemented to help identify & determine the authenticity/authorship of Intellectual Property contained within a circuit.
What is Watermarking & IP Watermarking?
Q. The substrate, commonly Silicon, on which ICs are produced and then delivered as for Back-End-of-Line processing. Many individual chips are found on each of these.
What is a wafer?
A Cryptography technique is frequently used for Authentication in both hardware & software. Typically this technique involves applying a one-way function to generate a unique output for a given input.
What is a hash/hashing?
A PUF must be easy to validate, but difficult to _____
Model/Predict/Clone.
SCA involves inspecting different physical features of a circuit. This type of SCA involves using expensive microscopes or lasers to inspect the physical metals within a chip.
What is optical analysis?
Q. A Trojan detection technique that involves observing the frequencies at which paths within a circuit can and cannot propagate signals. These observations are used to quantify internal delay and generate unique identifiers for an IC.
What is clock sweeping / path delay fingerprinting?
Q. This player of the IC Supply-Chain is affected the most by compromised EDA or design tools.
What is an IP Designer / IP Vendor?
Q. A Cryptography technique involves a secret “unknown” key that is generated by and stored within a Cryptosystem. Adversaries are unable to use this key to decrypt messages without knowing what transformation occurs to the key during decryption.
What is Red-Black Cryptography / Red-Key Black-Key.
Unlike AES, which is used for Encryption, a PUF is typically used for.
What is Authentication, Authenticity, Identification.
Anything can behave like an antenna. This type of SCA leverages the antenna-like quality of a physical circuit to measure radiation and deduce the behavior of a system.
What is EM Analysis?
Q. Trojans can be used to facilitate many types of attacks on hardware. This type of trojan intentionally makes a circuit produce an incorrect output so as to induce a new side-channel or leakage opportunity.
What is a fault injection trojan?
Q. A Supply Chain technique designed to prevent overproduction of ICs. This technique can be implemented passively or actively, and is used to uniquely identify and register individual ICs with challenge-response pairs or unique identifiers.
What is IC metering?