Sie sind auf Seite 1von 2

TABLE OF CONTENTS

ABSTRACT i
LIST OF FIGURES ii
LIST OF ABBREVIATIONS iii
CHAPTER 1 1
INTRODUCTION 1
1.1 OVERVIEW 1
1.2 MOTIVATION 3
1.3 OBJECTIVE AND GOAL 3
CHAPTER 2 5
LITERATURE REVIEW 5
2.1 CRYPTOGRAPHY 5
2.2 DATA ENCRYPTION STANDARD 5
2.3 ADVANCED ENCRYPTION STANDARD 6
2.3.1 Substitution byte 8
2.3.2 Shift rows 9
2.3.3 Mix columns 10
2.3.4 Add round key 11
2.4 SCAN TEST 11
2.5 SECURE TEST TECHNIQUES 12
2.5.1 Traditional Scan Flip Flop 13
2.5.2 Robust secure scan 13
2.5.3 Shatterproof secure scan design 14
CHAPTER 3 16
PROPOSED SYSTEM 16
3.1 DECRYPTION CIRCUIT OF TRADITIONAL SCAN FLIP FLOP 16
3.2 DECRPTION CIRCUIT OF RSSF 16
3.3 DECRYPTION CIRCUIT OF SSSF 17
3.4 ENCIPHER SHATTERPROOF SECURE SCAN DESIGN 17
CHAPTER 4 19
RESULT AND DISCUSSION 19
4.1 ENCRYPTION OF TRADITIONAL SCAN FLIPFLOP 19
4.2 ENCRYPTION OF ROBUST SECURE SCAN FLIPFLOP 20
4.3 ENCRYPTION OF SHATTERPROOF SECURE SCAN FLIPFLOP 21
4.4 DECRYPTION OF TRADITIONAL SCAN FLIPFLOP 22
4.5 DECRYPTION OF ROBUST SECURE SCAN FLIPFLOP 23
4.6 DECRYPTION OF SHATTERPROOF SECURE SCAN FLIPFLOP 24
4.7 ENCIPHER SHATTERPROOF SECURE SCAN DESIGN 25
CHAPTER 5 26
CONCLUSION AND FUTURE SCOPE 26
REFERENCES 27
APPENDIX A 28
APPENDIX B 31
APPENDIX C 35
APPENDIX D 39
APPENDIX E 41
APPENDIX F 47
APPENDIX G 54

Das könnte Ihnen auch gefallen