AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis

Reusing embedded resources for implementing built- in self test mechanisms allows test cost reduction. In this paper we demonstrate how to implement cost- efficient built-in self test functions from the AES cryptoalgorithm hardware implementation in a secure system. Self-test of the proposed implementation is also presented. A statistical test suite and fault-simulation are used for evaluating the efficiency of the corresponding cryptocore as pseudo-random test pattern generator; an analytical approach demonstrates the low probability of aliasing when used for test response compaction.

[1]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[2]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[3]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[4]  Jacob Savir,et al.  Built In Test for VLSI: Pseudorandom Techniques , 1987 .

[5]  Ramesh Karri,et al.  Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004, 2004 International Conferce on Test.

[6]  Peter Hellekalek,et al.  Empirical evidence concerning AES , 2003, TOMC.

[7]  Paul H. Bardell,et al.  Self-Testing of Multichip Logic Modules , 1982, International Test Conference.

[8]  Bruno Rouzeyre,et al.  Securing Scan Control in Crypto Chips , 2007, J. Electron. Test..

[9]  Bruno Rouzeyre,et al.  AES vs LFSR Based Test Pattern Generation: A Comparative Study , 2007 .

[10]  Walter Anheier,et al.  On Random Pattern Testability of Cryptographic VLSI Cores , 1999, European Test Workshop 1999 (Cat. No.PR00390).

[11]  Shigeo Shioda,et al.  Some upper and lower bounds on the coupon collector problem , 2007 .

[12]  Ramesh Karri,et al.  Secure scan: a design-for-test architecture for crypto chips , 2005, Proceedings. 42nd Design Automation Conference, 2005..

[13]  B. Koenemann,et al.  Built-in logic block observation techniques , 1979 .

[14]  Bruno Rouzeyre,et al.  Secure scan techniques: a comparison , 2006, 12th IEEE International On-Line Testing Symposium (IOLTS'06).