An Efficient Technique to Protect AES Secret Key From Scan Test Channel Attacks

Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. The authors' approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core.

Provided by: Hanyang University Topic: Mobility Date Added: Sep 2012 Format: PDF

Find By Topic