Abstract
Scan-based Design-for-Testability technique is widely used to enhance the testability. However, it increases the vulnerability to attacks through scan chains for secure chips such as cryptographic circuits with embedded secret keys. This paper proposes a secure scan design method which protects the circuits containing secret information such as cryptographic circuits from scan-based side channel attacks. The proposed method prevents the leakage of secret information by partial scan design based on a balanced structure. We also guarantee the testability of both the design under test and DFT circuitry, and therefore, realize both security and testability. Experiments for RSA circuit shows the effectiveness of the proposed method.
Similar content being viewed by others
References
Chandran U, Zhao D (2009) SS-KTC: a high-testability low-overhead scan architecture with multi-level security integration. In: Proceedings of VLSI test symposium, pp 321–326
Doulcier M, Flottes M-L, Rouzeyre B (2008) AES-based BIST: self-test, test pattern generation and signature analysis. In: Proceedings of IEEE international symposium on electronic design, test & applications, pp 314–321
Gupta R, Gupta R, Breuer M (1990) The BALLAST methodology for structured partial scan design. IEEE Trans Comput 39:538–544
Hely D, Bancel F, Flottes M-L, Rouzeyre B (2007) Securing scan control in crypto chips. J Electron Test Theory Appl 23:457–464
Hely D, Flottes M-L, Bancel F, Rouzeyre B, Berard N (2004) Scan design and secure chip. In: Proceedings of 10th IEEE international on-line testing symposium (IOLTS’04), pp 219–224
Kocher PC (1996) Timing attacks on implementations of diffie-hellman, RSA, DSS, and other sysetms. In: Proceedings of advances in cryptology—CRYPT0 ’96, pp 104–113
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of advances in cryptology—CRYPT0 ’99, pp 388–397
Kommerling O, Kuhn MG (1999) Design principles for tamper-resistant smartcard processors. In: Proceedings of USENIX workshop on smartcard technology
Lee J, Tehranipoor M, Patel C, Plusquellic J (2007) Securing designs against scan-based side-channel attacks. IEEE Trans Depend Secure Comput 4:325–336
OPENCORES. “RSA processor.” http://www.opencores.org/projects.cgi/web/rsa/overview
Paul S, Chakraborty RS, Bhunia S (2007) VIm-Scan: a low overhead scan design approach for protection of secret key in scan-based secure chips. In: Proceedings of 25th IEEE VLSI test symposium (VTS’07), pp 455–460
Yang B, Wu K, Karri R (2004) Scan based side channel attack on dedicated hardware implementations of data encryption standard. In: Proceedings of international test conference 2004 (ITC’04), pp 339–344
Yang B, Wu K, Karri R (2006) Secure scan: a design-for-test architecture for crypto chips. IEEE Trans Comput-Aided Des Integr Circuits Syst 25:2287–2293
Author information
Authors and Affiliations
Corresponding author
Additional information
Responsible Editor: C. Metra
This work was supported in part by Japan Society for the Promotion of Science (JSPS) under Grants-in-Aid for Scientific Research ((B)20300018, (C)18500038).
Rights and permissions
About this article
Cite this article
Inoue, M., Yoneda, T., Hasegawa, M. et al. Balanced Secure Scan: Partial Scan Approach for Secret Information Protection. J Electron Test 27, 99–108 (2011). https://doi.org/10.1007/s10836-011-5204-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10836-011-5204-0