James Geist, Shaojie Zhang, Yier Jin, Travis Meade
{"title":"A Structural and SAT Analysis of SANSCrypt","authors":"James Geist, Shaojie Zhang, Yier Jin, Travis Meade","doi":"10.1109/AsianHOST56390.2022.10022024","DOIUrl":null,"url":null,"abstract":"As IP theft remains an important problem, and attacks against logic locking mechanisms are becoming more sophisticated, the complexity of proposed encryption schemes are also becoming more complex. One goal of adding complexity is to increase the required time to perform an attack by forcing the required SAT problems to become so unwieldy, or require so many individual solves, that it is infeasible to break the encryption in reasonable time. In this paper, by discussing an attack against one such scheme, we demonstrate a combination of structural and SAT instances can break a design.","PeriodicalId":207435,"journal":{"name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST56390.2022.10022024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As IP theft remains an important problem, and attacks against logic locking mechanisms are becoming more sophisticated, the complexity of proposed encryption schemes are also becoming more complex. One goal of adding complexity is to increase the required time to perform an attack by forcing the required SAT problems to become so unwieldy, or require so many individual solves, that it is infeasible to break the encryption in reasonable time. In this paper, by discussing an attack against one such scheme, we demonstrate a combination of structural and SAT instances can break a design.