Title :
AES design space exploration new line for scan attack resiliency
Author :
Ali, Sk Subidh ; Sinanoglu, Ozgur ; Karri, Ramesh
Abstract :
Crypto-chips are vulnerable to side-channel attacks. Scan attack is one such side-channel attack which uses the scan-based DFT test infrastructure to leak the secret information of the crypto-chip. In the presence of scan, an attacker can run the chip in normal mode, and then by switching to the test mode, retrieve the intermediate results of the crypto-chip. Using only a few input-output pairs one can retrieve the entire secret key. Almost all the scan attacks on AES crypto-chip use the same iterative 128-bit AES design where the round register is placed exactly after the round operation. However, the attack potency may vary depending on the design of AES. In this work, we consider various designs of AES. We shed light on the impact of design style on the scan attack. We also consider response compaction in our analysis. We show that certain design decisions deliver inherent resistance to scan attack.
Keywords :
cryptography; design for testability; AES design space exploration; DFT test infrastructure; advanced encryption standard; cryptochips; design style; input-output pairs; normal mode; response compaction; round operation; round register; scan attack resiliency; secret key; side-channel attacks; test mode; word length 128 bit; Ciphers; Clocks; Computer architecture; Encryption; Hamming distance; Microprocessors; Registers; AES Scan Chain; Scan Attack; Scan-based DFT; Security; Testability;
Conference_Titel :
Very Large Scale Integration (VLSI-SoC), 2014 22nd International Conference on
Conference_Location :
Playa del Carmen
DOI :
10.1109/VLSI-SoC.2014.7004193