{"title":"Secure scan-based design using Blum Blum Shub algorithm","authors":"Elnaz Koopahi, S. E. Borujeni","doi":"10.1109/EWDTS.2016.7807656","DOIUrl":null,"url":null,"abstract":"Scan design is a powerful Design-for-Testability (DFT) technique that enhances controllability and observability of internal nodes of the circuit under test. However, it can increase system vulnerability being a back door to access secret information of a secure chip. In this paper, we present a scan-based design which is robust against scan-based side channel attacks. We use SHA256 secure hash and Blum Blum Shub pseudo random number generator to create a simple challenge/response scheme. The system can be used to enable JTAG instructions for authorized user or control access to IEEE 1687 on-chip instruments. The effectiveness of the proposed method has been verified using NIST statistical test suite.","PeriodicalId":364686,"journal":{"name":"2016 IEEE East-West Design & Test Symposium (EWDTS)","volume":"18 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE East-West Design & Test Symposium (EWDTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EWDTS.2016.7807656","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Scan design is a powerful Design-for-Testability (DFT) technique that enhances controllability and observability of internal nodes of the circuit under test. However, it can increase system vulnerability being a back door to access secret information of a secure chip. In this paper, we present a scan-based design which is robust against scan-based side channel attacks. We use SHA256 secure hash and Blum Blum Shub pseudo random number generator to create a simple challenge/response scheme. The system can be used to enable JTAG instructions for authorized user or control access to IEEE 1687 on-chip instruments. The effectiveness of the proposed method has been verified using NIST statistical test suite.