Experimentations on scan chain encryption with PRESENT

Mathieu da Silva 1 Marie-Lise Flottes 1 Giorgio Di Natale 1 Bruno Rouzeyre 1
1 TEST - TEST
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Crypto-processors are vulnerable to scan attacks. Using the scan chain, an attacker is indeed able to observe intermediate encryption states and steal secret data closely-related to the key. However, scan design is the most powerful mean for test and diagnostic purpose. Several countermeasure approaches have thus been proposed for securing scan designs while preserving test efficiency, diagnosis and debugging abilities. One solution is to encrypt test patterns thanks to extra block ciphers preventing control and observation of plain texts in the scan chain. The goal of this paper is to experiment this scan chain encryption approach on different designs in order to evaluate test efficiency and costs in terms of area and test time.
Complete list of metadatas

Cited literature [16 references]  Display  Hide  Download

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01699258
Contributor : Mathieu da Silva <>
Submitted on : Friday, February 2, 2018 - 12:23:45 PM
Last modification on : Wednesday, May 8, 2019 - 2:56:01 PM
Long-term archiving on : Thursday, May 3, 2018 - 4:59:24 AM

File

Experimentation on Scan Chain ...
Files produced by the author(s)

Identifiers

Collections

Citation

Mathieu da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Experimentations on scan chain encryption with PRESENT. IVSW: International Verification and Security Workshop, Jul 2017, Thessaloniki, Greece. pp.45-50, ⟨10.1109/IVSW.2017.8031543⟩. ⟨lirmm-01699258⟩

Share

Metrics

Record views

206

Files downloads

253