Home > Community > Forums > Custom IC Design > ncprotect when using user-defined keys

Email

* Required Fields

Recipients email * (separate multiple addresses with commas)

Your name *

Your email *

Message *

Contact Us

* Required Fields
First Name *

Last Name *

Email *

Company / Institution *

Comments: *

 ncprotect when using user-defined keys 

Last post Tue, Jun 24 2014 8:46 AM by James Bailey. 0 replies.
Started by James Bailey 24 Jun 2014 08:46 AM. Topic has 0 replies and 576 views
Page 1 of 1 (1 items)
Sort Posts:
  • Tue, Jun 24 2014 8:46 AM

    ncprotect when using user-defined keys Reply

    Hi,

     I am trying to understand the realities and risks of distributing an IP protected using the ncprotect tool.

    First let's note: 

     

    • ncprotect can encrypt (Verilog) source files using common algorithms such as AES, DES, RSA, RC2, RC4, or RC5.
    • It also allows the user to generate non-tool-embedded keys, which are to be distributed with the protected IP.

     

     

    My questions:

     

    1. Since the algorithms used are public and the user-defined public key(s) are to be distributed with the encrypted IP, what is to stop a particularly savvy user from using the key to decrypt the IP to plaintext?
    2. Could a savvy hacker extract the embedded CDS_NC keys from Cadence tool binaries?
     
    Thanks 

     

    • Post Points: 5
Page 1 of 1 (1 items)
Sort Posts:
Started by James Bailey at 24 Jun 2014 08:46 AM. Topic has 0 replies.