An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks
- Authors
- Song, Jaehoon; Jung, Taejin; Jung, Jihun; Park, Sungju
- Issue Date
- Sep-2012
- Publisher
- IEEK PUBLICATION CENTER
- Keywords
- AES; key protection; scan design; IEEE 1149.1 boundary scan design; SoC
- Citation
- JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.12, no.3, pp.286 - 292
- Indexed
- SCIE
SCOPUS
KCI
- Journal Title
- JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE
- Volume
- 12
- Number
- 3
- Start Page
- 286
- End Page
- 292
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/32179
- DOI
- 10.5573/JSTS.2012.12.3.286
- ISSN
- 1598-1657
- Abstract
- Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto So Cs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > SCHOOL OF COMPUTER SCIENCE > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/32179)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.