Skip to main content
Log in

Securing Scan Control in Crypto Chips

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

The design of secure ICs requires fulfilling means conforming to many design rules in order to protect access to secret data. On the other hand, designers of secure chips cannot neglect the testability of their chip since high quality production testing is primordial to a good level of security. However, security requirements may be in conflict with test needs and testability improvement techniques that increase both observability and controllability. In this paper, we propose to merge security and testability requirements in a control-oriented design for security scan technique. The proposed security scan design methodology induces an adaptation of two main aspects of testability technique design: protection at protocol level and at scan path level. Without loss of generality, the proposed solution is evaluated on a simple crypto chip in terms of security and design cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. Advances in cryptology, CRYPTO, LNCS 1294, pp 513–525

  2. Common criteria. Application of attack potential to smart-card. Common criteria, http://www.commoncriteriaportal.org

  3. Hély D, Flottes M-L, Bancel F, Rouzeyre B, Renovell M, Bérard N (2004) SCAN Design and secure chip. International On-Line Test Symposium (IOLTS) Funchal, Portugal, pp 219–224, 12–14 July 2004

  4. Institute of Electrical and Electronics Engineers. Standard test access port and boundary-SCAN architecture. IEEE Std, 1149.1-2001

  5. Josephson D, Poehman S (2001) Debug methodology for the Mckinley processor. International Test Conference, (ITC), Baltimore, USA, pp 451–460, 30 Oct–1 Nov 2001

  6. Kocher P, Lee R, McGraw G, Raghunantan A, Ravi S (2004) Security as a new dimension in embedded system design. Design Automation Conference (DAC), pp 753–760, 7–11 June 2004

  7. Renaudin M, Bouesse GF, Proust P, Tual J-P, Sourgen L, Germain F (2004) High-security smartcards. Design Automation and Test in Europe Conference (DATE) Paris, France, 16–20 February 2004

  8. Synopsys. Design compiler data sheet 2003 http://www.synopsys.com/products/logic/dc_expert_ds.pdf

  9. Yang B, Wu K, Karri R ( 2004) Scan-based side-channel attack on dedicated hardware implementations on data encryption standard. International Test Conference (ITC), Charlottes, USA, pp 339–344, 26–28 October 2004

  10. Yang B, Wu K, Karri R (2006) Secure scan: a design-for-test architecture for crypto chips. IEEE Trans CAD 25(10), pp 2287–2293, Oct 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bruno Rouzeyre.

Additional information

Responsible Editor: C. Landrault

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hély, D., Bancel, F., Flottes, ML. et al. Securing Scan Control in Crypto Chips. J Electron Test 23, 457–464 (2007). https://doi.org/10.1007/s10836-007-5000-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-007-5000-z

Keywords

Navigation