2018 IEEE 3rd International Verification and Security Workshop (IVSW) 2018
DOI: 10.1109/ivsw.2018.8494852
|View full text |Cite
|
Sign up to set email alerts
|

A New Secure Stream Cipher for Scan Chain Encryption

Abstract: The accessibility to the internal IP cores of Systems on Chip (SoC) provided by the testing infrastructures is a serious security threat. It has been known for many years that the scan chains can be exploited to retrieve secret keys of cryptoprocessors. Encryption of the scan chain content is one of the proposed techniques to overtake this threat. Many proposals are based on stream ciphers, due to their moderate area cost compared to that of block ciphers. Stream ciphers encrypt data serially with a keystream … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 12 publications
0
20
0
Order By: Relevance
“…Further, ScanSAT can be thwarted by encrypting/decrypting the stimulus and the response by using provably secure techniques [37]; but this requires using dedicated, and thus, costly on-chip cipher blocks. Another approach would be to utilize PUFs as in [38] at the expense of reliability concerns associated with PUFs.…”
Section: Limitations Of Scansatmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, ScanSAT can be thwarted by encrypting/decrypting the stimulus and the response by using provably secure techniques [37]; but this requires using dedicated, and thus, costly on-chip cipher blocks. Another approach would be to utilize PUFs as in [38] at the expense of reliability concerns associated with PUFs.…”
Section: Limitations Of Scansatmentioning
confidence: 99%
“…Bias PUF based scan [38] ScanSAT-resilient large circuits such as s38584 and b19 (even with a key-size of 128). For s38584, the only benchmark common to our and their work, the NSAA tool reportedly crashed [24].…”
Section: Comparison Against Nsaa [24]mentioning
confidence: 99%
“…In this section, we first present a SESC [19] implementation that does not present the vulnerability of the state-of-the-art solutions discussed so far (see Section V.A). After that, we describe a SEBC [23] implementation using lightweight block ciphers.…”
Section: Scan Encryption Countermeasuresmentioning
confidence: 99%
“…The present SESC countermeasure has been proposed in [19]. Compared to previous solutions, the IV value is randomly generated by a True Random Number Generator (TRNG) at every circuit reset, thus preventing two-time pad attacks.…”
Section: A Stream-based Scan Encryptionmentioning
confidence: 99%
See 1 more Smart Citation