Does stream cipher-based scan chains encryption really prevent scan attacks?

Mathieu da Silva 1 Marie-Lise Flottes 1 Giorgio Di Natale 1 Bruno Rouzeyre 1
1 TEST - TEST
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Scan chains offer facilities to steal secret information embedded in a circuit. For instance on a crypto-processor, collecting data related to the round register leads to reveal the secret key used for encryption. To protect against this threat while maintaining the test and debug features, countermeasures are implemented on the test interface or on the scan chain itself. Among the countermeasures, some of them are based on stream ciphers, consisting in the encryption of both controlled and observed data in the scan chain. We show in this paper that the stream cipher protection presents vulnerabilities if the keystream generated by the stream cipher is identical after a reset.
Complete list of metadatas

Cited literature [19 references]  Display  Hide  Download

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01867286
Contributor : Mathieu da Silva <>
Submitted on : Tuesday, September 4, 2018 - 11:05:54 AM
Last modification on : Wednesday, May 8, 2019 - 2:56:01 PM
Long-term archiving on : Wednesday, December 5, 2018 - 2:15:47 PM

File

Differential attacks on stream...
Files produced by the author(s)

Identifiers

  • HAL Id : lirmm-01867286, version 1

Collections

Citation

Mathieu da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Does stream cipher-based scan chains encryption really prevent scan attacks?. TRUDEVICE Workshop, Mar 2018, Dresden, Germany. ⟨lirmm-01867286⟩

Share

Metrics

Record views

430

Files downloads

67