Challenge-response based secure test wrapper for testing cryptographic circuits

نویسندگان

  • Amitabh Das
  • Miroslav Knežević
  • Stefaan Seys
  • Ingrid Verbauwhede
چکیده

C ryptographic circuits need special test infrastructure due to the concern of security involved. Normal design for testability methods, such as scan chains, as applied to most ASICs cannot be applied directly to Cryptographic chips. These methods, though providing the highest testability, open backdoors or side-channels for attackers, to extract secret keys or Intellectual Property information from the core. Built-in Self-Test is normally applied for such secure chips, but it suffers from aliasing, high area overhead, and inadequate fault coverage, requiring additional deterministic top-up test patterns. Existing secure testing methods only provide security through obscurity by randomizing the scan chain operation. The current work seeks to address this tradeoff between security, testability and test area overhead by presenting a challenge-response based Secure Test Wrapper structure, suitable for testing IP cores in a SoC environment. This scheme includes the KATAN lightweight block-cipher into IEEE 1500 Standard Test Wrapper and as such provides an extremely compact locking and unlocking mechanism for the standard scan chains. The overhead to include this secure locking/unlocking mechanism is limited to about 9% compared to a standard scan and test wrapper. The main contributions of the paper are full testability, very high security and scalability of the proposed design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced P1500 Compliant Wrapper suitable for Delay Fault Testing of Embedded Cores

Continual advances in the manufacturing processes of integrated circuits provide designers the ability to create more complex and denser architectures and increased functionality on a single chip. The increased usage of embedded cores necessitates a core-based test strategy in which cores are also tested separately. The IEEE P1500 proposed standard for Embedded Core Test (SECT) is a standard un...

متن کامل

Delay Fault Testing of Embedded Cores using an Enhanced P1500 Compliant Wrapper

Continual advances in the manufacturing processes of integrated circuits provide designers the ability to create more complex and denser architectures and increased functionality on a single chip. The increased usage of embedded cores necessitates a core-based test strategy in which cores are also tested separately. The IEEE P1500 proposed standard for Embedded Core Test (SECT) is a standard un...

متن کامل

Practical DRAM PUFs in Commodity Devices

A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, due to variations in the fabrication processes. Prior works have demonstrated that PUFs are a promising cryptographic primitive to enable hardware-based device authentication and identification. A diverse number of PUFs have been explored, e.g., delay-based PUFs in dedicated circuits, S...

متن کامل

A Framework for the Evaluation of Physical Unclonable Functions

A PUF is a chip-unique challenge-response mechanism exploiting manufacturing process variation inside integrated circuits (ICs). It has many useful applications such as device authentication and secure, memory-less key storage. A mobile device can be authenticated using a PUF challenge-response pair. Moreover, a cryptographic key can be securely embedded in a mobile device using a PUF without a...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010