2019 IEEE 22nd International Symposium on Design and Diagnostics of Electronic Circuits &Amp; Systems (DDECS) 2019
DOI: 10.1109/ddecs.2019.8724654
|View full text |Cite
|
Sign up to set email alerts
|

Encryption-Based Secure JTAG

Abstract: Standard test infrastructures, such as IEEE Std. 1149.1 (JTAG), IEEE Std. 1500 and IEEE Std. 1687 (IJTAG), are widely used in nowadays Integrated Circuits (ICs). However, they pose an important security challenge to the designers because of the high controllability and observability they offer through the Test Access Port (TAP). For instance, malicious users can exploit test infrastructures in order to access the internal scan chains of crypto-cores and perform scan attacks. Moreover, these infrastructures con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…If we use a dedicated cipher for each bit, the cost increases but we can be sure that the key stream perfectly fits to the segment it belongs to; this, on the other hand, is not so simple if the cryptographic core is centralized. In this case, the fact that the key addition is within the scan chain, and not at its boundaries as in [22], causes a phase shift between the data and the key. If a stream cipher is used, then the phase shift can be easily corrected by a corresponding shift in the key stream provided by the user.…”
Section: B Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…If we use a dedicated cipher for each bit, the cost increases but we can be sure that the key stream perfectly fits to the segment it belongs to; this, on the other hand, is not so simple if the cryptographic core is centralized. In this case, the fact that the key addition is within the scan chain, and not at its boundaries as in [22], causes a phase shift between the data and the key. If a stream cipher is used, then the phase shift can be easily corrected by a corresponding shift in the key stream provided by the user.…”
Section: B Discussionmentioning
confidence: 99%
“…The use of a stream cipher is confirmed in [22], where the secret key is provided by the user, whereas the IV is generated internally using a True Random Number Generator. This approach ensures that the scheme is robust enough against attacks based on value reuse or collisions.…”
Section: B Confidentiality Of Vectors: a Global Approachmentioning
confidence: 99%
“…When an encryption-based scheme is implemented, the user needs to encrypt the test data with a secret key before shifting the test data via TDI [18]. After the encrypted test data is sent to the device, it will be decrypted with the secret key.…”
Section: ) Encryption-based Methodsmentioning
confidence: 99%
“…The encryption-based countermeasure decrypts the test data and encrypts the response using a cipher circuit inside a chip [18]. Thus the attacker cannot get the true test response until decrypting with the correct key.…”
Section: F Comparison With Other Workmentioning
confidence: 99%
See 1 more Smart Citation