Re-Imagining The Security Of The Hardware Using Lookup Table Based Obfuscation