Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists

Scan-based design for test (DFT) is a powerful and the most popular testing technique. However, while scanbased DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the chip. This paper investigates the side channel and proposes a simple but powerful scan-based attack that can reveal the key and/or state stored in the chips that implement the state-of-the-art stream ciphers with less than 85 scan-out vectors.

[1]  Michel Renovell,et al.  Scan Design and Secure Chip , 2004, IOLTS.

[2]  Debdeep Mukhopadhyay,et al.  CryptoScan: A Secured Scan Chain Architecture , 2005, 14th Asian Test Symposium (ATS'05).

[3]  Mark Mohammad Tehranipoor,et al.  Securing Scan Design Using Lock and Key Technique , 2005, 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'05).

[4]  Anne Canteaut,et al.  Open Problems Related to Algebraic Attacks on Stream Ciphers , 2005, WCC.

[5]  Mark Mohammad Tehranipoor,et al.  A low-cost solution for protecting IPs against scan-based side-channel attacks , 2006, 24th IEEE VLSI Test Symposium.

[6]  Yu Liu,et al.  Scan-based attacks on linear feedback shift register based stream ciphers , 2011, TODE.

[7]  Don Douglas Josephson,et al.  Debug methodology for the McKinley processor , 2001, Proceedings International Test Conference 2001 (Cat. No.01CH37260).

[8]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[9]  Bart Preneel,et al.  A survey of recent developments in cryptographic algorithms for smart cards , 2007, Comput. Networks.

[10]  Ramesh Karri,et al.  Secure scan: a design-for-test architecture for crypto chips , 2005, Proceedings. 42nd Design Automation Conference, 2005..

[11]  A. A. Kamal,et al.  A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[12]  Yaser Esmaeili Salehani,et al.  SIDE CHANNEL ATTACKS ON SYMMETRIC KEY PRIMITIVES , 2011 .

[13]  M. Renovell,et al.  Scan design and secure chip [secure IC testing] , 2004, Proceedings. 10th IEEE International On-Line Testing Symposium.

[14]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..