Skip to main content

A Novel Countermeasure Against Differential Scan Attack in AES Algorithm

  • Conference paper
  • First Online:
VLSI Design and Test (VDAT 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 892))

Included in the following conference series:

  • 1329 Accesses

Abstract

The Design for Testability (specifically scan designs) is standard testing techniques for Digital cores for achieving high fault coverage and to provide better controllability and observability. However, such test architectures in the chip containing secret data mostly becomes the instrumental for secret information leakage. The attacker may use different implementation attacks to leak the secret data. In this paper, we first analyse the existing scan designs from security perspective. We demonstrated that how the secret key is retrieved by differential scan attack (DSA) in case of symmetric encryption standards (AES). Furthermore, it is also shown that AES along with time compactor also fails to provide sufficient security. We then propose novel prevention mechanism, Modular Exponentiation Secure Scheme (ME-SS), which clears the insecure states of all the existing techniques. Our experimental results show that the proposed countermeasures can effectively insulate all the information related to cipher key from DSA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hurst, S.L.: VLSI Testing: Digital and Mixed Analogue/Digital Techniques. IEE, London (1998)

    Book  Google Scholar 

  2. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (1996)

    MATH  Google Scholar 

  3. Nara, R., Satoh, K., Yanagisawa, M., Ohtsuki, T., Togawa, N.: Scan-based side-channel attack against RSA cryptosystems using scan signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E93-A(12), 2481–2489 (2010)

    Article  Google Scholar 

  4. Liu, Y., Wu, K., Karri, R.: Scan-based attacks on linear feedback shift register based stream ciphers. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 16(2), 1–15 (2011)

    Article  Google Scholar 

  5. Nara, R., Togawa, N., Yanagisawa, M., Ohtsuki, T.: Scan-based attack against ellipticcurve cryptosystems. In: 15th IEEE Asia and South Pacific Design Automation Conference (ASP-DAC10), pp. 407–412 (2010)

    Google Scholar 

  6. Yang, B., Wu, K., Karri, R.: Scan based side channel attack on dedicated hardware implementations of data encryption standard. In: Proceedings of IEEE International Test Conference, pp. 339– 344 (2004)

    Google Scholar 

  7. Yang, B., Wu, K., Karri, R.: Secure scan: a design-for-test architecture for cryptochips. IEEE Trans. Comput. Aided Des. Integr. Circu. Syst. 25(10), 2287–2293 (2006)

    Article  Google Scholar 

  8. Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

    Chapter  Google Scholar 

  9. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  10. Quisquater, J.-J., Samyde, D.: ElectroMagnetic analysis (EMA): measures and counter-measures for smart cards. In: Attali, I., Jensen, T.P. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45418-7_17

    Chapter  MATH  Google Scholar 

  11. Kommerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcardprocessors. In: Proceedings of the USENIX Workshop on Smartcard Technology, p. 22. USENIX Association, Berkeley (1999)

    Google Scholar 

  12. Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski, B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 260–275. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_20

    Chapter  Google Scholar 

  13. Endo, S., Sugawara, T., Homma, N., Aoki, T., Satoh, A.: An on-chip glitchy clock generator for testing fault injection attacks. J. Cryptogr. Eng. 1, 265–270 (2011)

    Article  Google Scholar 

  14. Skorobogatov, S.: Low temperature data remanence in static RAM. University of Cambridge, Computer Laboratory, Technical Report UCAM-CL-TR-536, June 2002. http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf

  15. Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_2

    Chapter  Google Scholar 

  16. Schmidt, J.-M., Hutter, M.: Optical and EM fault-attacks on CRT-based RSA: concrete results. In: Karl, J.W., Posch, C. (eds.) Austrochip 2007, 15th Austrian Workhop on Microelectronics, 11 October 2007, Graz, Austria, Proceedings, pp. 61–67. Verlag der Technischen Universität Graz, Graz (2007)

    Google Scholar 

  17. DaRolt, J., Di Natale, G., Flottes, M.L., Rouzeyre, B.: Scan attacks and countermeasures in presence of scan response compactors. In: Sixteenth IEEE European Test Symposium, Trondheim, pp. 19–24 (2011)

    Google Scholar 

  18. Da Rolt, J., Di Natale, G., Flottes, M.L., Rouzeyre, B.: Are advanced DfT structures sufficient for preventing scan-attacks? In: IEEE 30th VLSI Test Symposium (VTS), Hyatt Maui, HI, pp. 246–251 (2012)

    Google Scholar 

  19. Ege, B., Das, A., Gosh, S., Verbauwhede, I.: Differential scan attack on AESwith X-tolerant and X-masked test response compactor. In: 2012 15th Euromicro Conference on Digital System Design (DSD), pp. 545–552. IEEE (2012)

    Google Scholar 

  20. Natale, G.D., Doulcier, M., Flottes, M.L., Rouzeyre, B.: Self-test techniques for crypto-devices. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(2), 329–333 (2010)

    Article  Google Scholar 

  21. Da Rolt, J., Di Natale, G., Flottes, M.L., Rouzeyre, B.: On-chip test comparison for protecting confidential data in secure ICS. In: 2012 17th IEEE European Test Symposium (ETS), p. 1, May 2012

    Google Scholar 

  22. Sengar, G., Mukhopadhayay, D., Roy Chowdhury, D.: An efficient approach to develop secure scan tree for crypto-hardware. In: International Conference on Advanced Computing and Communications, ADCOM 2007, pp. 21–26, December 2007

    Google Scholar 

  23. Das, A., Ege, B., Ghosh, S., Batina, L., Verbauwhede, I.: Security analysis of industrial test compression schemes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(12), 1966–1977 (2013)

    Article  Google Scholar 

  24. Kalaiselvi, K., Mangalam, H.: Power efficient and high-performance VLSI architecture for AES algorithm. J. Electr. Syst. Inf. Technol. 2(2), 178–183 (2015)

    Google Scholar 

  25. Ahlawat, S., Vaghani, D., Tudu, J., Singh, V.: On securing scan design from scan-based side-channel attacks. In: 2017 IEEE 26th Asian Test Symposium (ATS), pp. 58–63. IEEE (2017)

    Google Scholar 

  26. http://csrc.nist.gov/publications/PubsFIPS.html

Download references

Acknowledgment

We are thankful to Research Progress Committee members Dr. K.S. Dasgupta and Dr. Virendra Singh for their review, insightful comments and constructive suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayesh Popat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Popat, J., Mehta, U. (2019). A Novel Countermeasure Against Differential Scan Attack in AES Algorithm. In: Rajaram, S., Balamurugan, N., Gracia Nirmala Rani, D., Singh, V. (eds) VLSI Design and Test. VDAT 2018. Communications in Computer and Information Science, vol 892. Springer, Singapore. https://doi.org/10.1007/978-981-13-5950-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5950-7_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5949-1

  • Online ISBN: 978-981-13-5950-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics