An FPGA Configuration Scheme for Bitstream Protection | SpringerLink
Skip to main content

An FPGA Configuration Scheme for Bitstream Protection

  • Conference paper
Reconfigurable Computing: Architectures, Tools and Applications (ARC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4943))

Included in the following conference series:

Abstract

FPGAs are widely used recently, and security on configuration bitstreams is of concern to both users and suppliers of configuration bitstreams (e.g., intellectual property vendors). In order to protect configuration bitstreams against the threats such as FPGA viruses, piracy and reverse engineering, configuration bitstreams need to be encrypted and authenticated before loaded into FPGAs. In this paper, we propose a new FPGA configuration scheme that can authenticate and/or decrypt a bitstream. The proposed scheme has flexibility in choosing authentication and/or decryption algorithms and causes only a small area overhead since it utilizes programmable logic blocks to implement authentication and/or decryption circuits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Altera Corp., http://www.altera.com/

  2. Bossuet, L., Gogniat, G., Burleson, W.: Dynamically configurable security for SRAM FPGA bitstreams. International Journal of Embedded Systems 2(1/2), 73–85 (2006)

    Article  Google Scholar 

  3. Drimer, S.: Authentication of FPGA Bitstreams: why and how. In: Diniz, P.C., Marques, E., Bertels, K., Fernandes, M.M., Cardoso, J.M.P. (eds.) ARCS 2007. LNCS, vol. 4419, pp. 73–84. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Hadžić, I., Udani, S., Smith, J.M.: FPGA viruses. In: Lysaght, P., Irvine, J., Hartenstein, R.W. (eds.) FPL 1999. LNCS, vol. 1673, pp. 291–300. Springer, Heidelberg (1999)

    Google Scholar 

  5. Kean, T.: Secure configuration of field programmable gate arrays. In: Proc. of 9th IEEE Symposium on Field Programmable Custom Computing Machines (FCCM2001), pp. 259–260 (2001)

    Google Scholar 

  6. Kean, T.: Secure configuration of field programmable gate arrays. In: Brebner, G., Woods, R. (eds.) FPL 2001. LNCS, vol. 2147, Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Parelkar, M.M., Gaj, K.: Implementation of EAX mode of operation for FPGA bitstream encryption and authentication. In: Proc. of IEEE International Conference on Field-Programmable Technology, pp. 335–336 (2005)

    Google Scholar 

  8. Xilinx Inc., http://www.xilinx.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Roger Woods Katherine Compton Christos Bouganis Pedro C. Diniz

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nakanishi, M. (2008). An FPGA Configuration Scheme for Bitstream Protection. In: Woods, R., Compton, K., Bouganis, C., Diniz, P.C. (eds) Reconfigurable Computing: Architectures, Tools and Applications. ARC 2008. Lecture Notes in Computer Science, vol 4943. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78610-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78610-8_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78609-2

  • Online ISBN: 978-3-540-78610-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics