Secured flipped scan-chain model for crypto-architecture

被引:87
作者
Sengar, Gaurav [1 ]
Mukhopadhyay, Debdeep
Chowdhury, Dipanwita Roy
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
关键词
Index Terms-Block ciphers; design_for_testability; hardware overhead; scan_based_test; scan-chain-based attacks; security margin; stream; ciphers;
D O I
10.1109/TCAD.2007.906483
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Scan chains are exploited to develop attacks on cryptographic hardware and steal intellectual properties from the chip. This paper proposes a secured strategy to test designs by inserting a certain number of inverters between randomly selected scan cells. The security of the scheme has been analyzed. Two detailed case studies of RC4 stream cipher and AES block cipher have been presented to show that the proposed strategy prevents existing scan-based attacks in the literature. The elegance of the, scheme lies in its less hardware overhead.
引用
收藏
页码:2080 / 2084
页数:5
相关论文
共 12 条
[1]  
Daemen J, 2002, DESIGN RIJNDAEL
[2]  
Hély D, 2004, 10TH IEEE INTERNATIONAL ON-LINE TESTING SYMPOSIUM, PROCEEDINGS, P219
[3]  
Kapur R, 2004, INT TEST CONF P, P1414
[4]  
Kitsos P, 2003, PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, P1363
[5]  
Lee J, 2005, INT SYM DEFEC FAU TO, P51
[6]   An efficient end to end design of Rijndael cryptosystem in 0.18 μ CMOS [J].
Mukhopadhyay, D ;
RoyChowdhury, D .
18TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: POWER AWARE DESIGN OF VLSI SYSTEMS, 2005, :405-410
[7]   CryptoScan: A secured scan chain architecture [J].
Mukhopadhyay, D ;
Banerjee, S ;
RoyChowdhury, D ;
Bhattacharya, BB .
14TH ASIAN TEST SYMPOSIUM, PROCEEDINGS, 2005, :348-353
[8]  
Seberry J, 1993, P 1 ACM C COMP COMM, P171
[9]  
Stallings W., 2003, CRYPTOGRAPHY NETWORK
[10]   Secure scan: A design-for-test architecture for crypto chips [J].
Yang, B ;
Wu, KJ ;
Karri, R .
42ND DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2005, 2005, :135-140