Experimentations on scan chain encryption with PRESENT - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Access content directly
Conference Papers Year : 2017

Experimentations on scan chain encryption with PRESENT


Crypto-processors are vulnerable to scan attacks. Using the scan chain, an attacker is indeed able to observe intermediate encryption states and steal secret data closely-related to the key. However, scan design is the most powerful mean for test and diagnostic purpose. Several countermeasure approaches have thus been proposed for securing scan designs while preserving test efficiency, diagnosis and debugging abilities. One solution is to encrypt test patterns thanks to extra block ciphers preventing control and observation of plain texts in the scan chain. The goal of this paper is to experiment this scan chain encryption approach on different designs in order to evaluate test efficiency and costs in terms of area and test time.
Fichier principal
Vignette du fichier
Experimentation on Scan Chain Encryption-cameraready-IVSW17.pdf (737.19 Ko) Télécharger le fichier
Origin Files produced by the author(s)

Dates and versions

lirmm-01699258 , version 1 (02-02-2018)



Mathieu da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Experimentations on scan chain encryption with PRESENT. IVSW: International Verification and Security Workshop, Jul 2017, Thessaloniki, Greece. pp.45-50, ⟨10.1109/IVSW.2017.8031543⟩. ⟨lirmm-01699258⟩
198 View
256 Download



Gmail Mastodon Facebook X LinkedIn More