skip to main content
10.1145/1065579.1065617acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
Article

Secure scan: a design-for-test architecture for crypto chips

Published:13 June 2005Publication History

ABSTRACT

Scan-based Design-for-Test (DFT) is a powerful testing scheme, but it can be used to retrieve the secrets stored in a crypto chip thus compromising its security. On one hand, sacrificing security for testability by using traditional scan-based DFT restricts its use in privacy sensitive applications. On the other hand, sacrificing testability for security by abandoning scan-based DFT hurts product quality. The security of a crypto chip comes from the small secret key stored in a few registers and the testability of a crypto chip comes from the data path and control path implementing the crypto algorithm. Based on this key observation, we propose a novel scan DFT architecture called secure scan that maintains the high test quality of traditional scan DFT without compromising the security. We used a hardware implementation of the Advanced Encryption Standard (AES) to show that the traditional Scan DFT scheme can compromise the secret key. We then showed that by using secure scan DFT, neither the secret key nor the testability of the AES implementation is compromised.

References

  1. S. Mangard, M. Aigner and S. Dominikus, A Highly Regular and Scalable AES Hardware Architecture, IEEE Transactions on Computer, vol. 52, no.1, pp. 483--491, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M.L. Bushnell and V.D. Agrawal, Essentials of Electronic Testing, Kluwer Academic Publishers, 2000.Google ScholarGoogle Scholar
  3. D. Josephson and S. Poehhnan, Debug methodology for the McKinley processor, International Test Conference, pp.451--460, 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Yang, K. Wu and R. Karri, Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard, International Test Conference, pp.339--344, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Goering, Scan Design Called Portal for Hackers, EE Times, Oct. 2004. http://www.eetimes.com/news/latest/ showArticle.jhtml?articleID=51200146Google ScholarGoogle Scholar
  6. Maestra Comprehensive Guide to Satellite TV Testing, 2002. http://www.maestra.tv/downloads/Maestra_Guide. pdfGoogle ScholarGoogle Scholar
  7. O. Kömmerling, M. G. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors, USENIX Workshop on Smartcard Technology, pp.9--20, May, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. J. Easter, E. W. Chencinski, E. J. D'Avignon, S. R. Greenspan, W. A. Merz and C. D. Norberg, S/390 Parallel Enterprise Server CMOS Cryptographic Coprocessor, IBM Journal of Research and Development, Vol 43, pp.761--776,1999 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Hély, F. Bancel, ML Flottes, B. Rouzeyre, M. Renovell and N. Bérard, Scan Design and Secure Chip, IEEE International On-Line Testing Symposium pp.219--226, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Zimmermann, A. Curiger, H. Bonnenberg, H. Kaeslin, N. Felber and W. Fichtner, A 177Mb/sec VLSI implementation of the international data encryption algorithm, IEEE Journal of Solid-State Circuits, vol. 29, no. 3, pp. 303--307, March, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  11. National Bureau of Standards, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication FIPS PUB 140--2, 2002.Google ScholarGoogle Scholar
  12. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, CRYPTO, pp. 156--171, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure scan: a design-for-test architecture for crypto chips

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DAC '05: Proceedings of the 42nd annual Design Automation Conference
        June 2005
        984 pages
        ISBN:1595930582
        DOI:10.1145/1065579

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 June 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,770of5,499submissions,32%

        Upcoming Conference

        DAC '24
        61st ACM/IEEE Design Automation Conference
        June 23 - 27, 2024
        San Francisco , CA , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader