Abstract
The design of secure ICs requires fulfilling means conforming to many design rules in order to protect access to secret data. On the other hand, designers of secure chips cannot neglect the testability of their chip since high quality production testing is primordial to a good level of security. However, security requirements may be in conflict with test needs and testability improvement techniques that increase both observability and controllability. In this paper, we propose to merge security and testability requirements in a control-oriented design for security scan technique. The proposed security scan design methodology induces an adaptation of two main aspects of testability technique design: protection at protocol level and at scan path level. Without loss of generality, the proposed solution is evaluated on a simple crypto chip in terms of security and design cost.
Similar content being viewed by others
References
Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. Advances in cryptology, CRYPTO, LNCS 1294, pp 513–525
Common criteria. Application of attack potential to smart-card. Common criteria, http://www.commoncriteriaportal.org
Hély D, Flottes M-L, Bancel F, Rouzeyre B, Renovell M, Bérard N (2004) SCAN Design and secure chip. International On-Line Test Symposium (IOLTS) Funchal, Portugal, pp 219–224, 12–14 July 2004
Institute of Electrical and Electronics Engineers. Standard test access port and boundary-SCAN architecture. IEEE Std, 1149.1-2001
Josephson D, Poehman S (2001) Debug methodology for the Mckinley processor. International Test Conference, (ITC), Baltimore, USA, pp 451–460, 30 Oct–1 Nov 2001
Kocher P, Lee R, McGraw G, Raghunantan A, Ravi S (2004) Security as a new dimension in embedded system design. Design Automation Conference (DAC), pp 753–760, 7–11 June 2004
Renaudin M, Bouesse GF, Proust P, Tual J-P, Sourgen L, Germain F (2004) High-security smartcards. Design Automation and Test in Europe Conference (DATE) Paris, France, 16–20 February 2004
Synopsys. Design compiler data sheet 2003 http://www.synopsys.com/products/logic/dc_expert_ds.pdf
Yang B, Wu K, Karri R ( 2004) Scan-based side-channel attack on dedicated hardware implementations on data encryption standard. International Test Conference (ITC), Charlottes, USA, pp 339–344, 26–28 October 2004
Yang B, Wu K, Karri R (2006) Secure scan: a design-for-test architecture for crypto chips. IEEE Trans CAD 25(10), pp 2287–2293, Oct 2006
Author information
Authors and Affiliations
Corresponding author
Additional information
Responsible Editor: C. Landrault
Rights and permissions
About this article
Cite this article
Hély, D., Bancel, F., Flottes, ML. et al. Securing Scan Control in Crypto Chips. J Electron Test 23, 457–464 (2007). https://doi.org/10.1007/s10836-007-5000-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10836-007-5000-z