期刊文献+

Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists

Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
原文传递
导出
摘要 Scan-based design for test (DFT) is a powerful and the most popular testing technique. However, while scan-based DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the chip. This paper investigates the side channel and proposes a simple but powerful scan-based attack that can reveal the key and/or state stored in the chips that implement the state-of-the-art stream ciphers with less than 85 scan-out vectors. Scan-based design for test (DFT) is a powerful and the most popular testing technique. However, while scan-based DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the chip. This paper investigates the side channel and proposes a simple but powerful scan-based attack that can reveal the key and/or state stored in the chips that implement the state-of-the-art stream ciphers with less than 85 scan-out vectors.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期646-655,共10页 计算机科学技术学报(英文版)
基金 partially supported by the National High Technology Research and Development 863 Program of China under Grant No.2013AA013202 the Key Programs for Science and Technology Development of Chongqing of China under Grant No.cstc2012ggC40005 the National Natural Science Foundation of China under Grant No.61173014 the National Science Foundation of USA under Grant No.CNS-1015802
关键词 scan-based attack stream cipher linear and non-linear feedback shift register scan-based design for test scan-based attack, stream cipher, linear and non-linear feedback shift register, scan-based design for test
  • 相关文献

参考文献13

  • 1Hely D, Flottes M L, Bancel F et al. Scan design and secure chip. In Proc, the 10th IEEE International On-Line Testing Symposium, Jul. 2004, pp.219-226.
  • 2Josephson D D, Poehhnan S, Govan V. Debug methodology for the McKinley processor. InProc. the International Test Conference, Nov. 2001, pp.451-460.
  • 3Skorobogatov S P, Anderson R J. Optical fault induction attacks. In Lecture Notes in Computer Science 2523, Kaliski B S, Koc C K, Paar C (eds.), Springer-Verlag Berlin Heidelberg, 2002, pp.2-12.
  • 4Yang B, Wu K, Karri R. Secure scan: A design-for-test architecture for crypto chips. IEEE Trans. Computer-Aided Design of Integmted Circuits and Systems, 2006, 25(10): 2287- 2293.
  • 5Kamal A A, Youssef A M. A scan-based side channel attack on the NTRUEncrypt cryptosystem. In Proc. the 7th International Conference on Availability, Reliability and Security, Aug. 2012, pp.402-409.
  • 6Salehani Y E. Side channel attacks on symmetric key primitives [Master Thesis]. Concordia University, 2011. http:/ / spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf, May 2014.
  • 7Preneel B. A survey of recent developments in cryptographic algorithms for smart cards. Computer Networks, 2007, 51(9): 2223-2233.
  • 8Canteaut A. Open problems related to algebraic attacks on stream ciphers. In Lecture Notes in Computer Science 3969, Ytrehus 0(ed.), Springer Berlin Heidelberg, pp.120-134.
  • 9Hell M, Johansson T, Meier W. Grain: A stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2007, 2(1): 86-93.
  • 10Liu Y, Wu K, Karri R. Scan-based attacks on linear feedback shift register based stream ciphers. ACM Trans. Design Automation of Electronic Systems, 2011, 16(2), Article No.20.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部