Offline error-detection strategies for the IDEA NXT crypto-algorithm

This paper presents a series of Built-In Self-Test architectures designed for the IDEA NXT family of crypto-algorithms implemented in crypto-chips. The proposed error-detection schemes are capable of verifying the integrity of the crypto-chip in an autonomous, non-concurrent manner. One of the testing solutions consists of stimulating the algorithm with test vectors generated by the IDEA NXT core while the other one stimulate the cryptographic device by means of conventional test pattern generation techniques implemented as cellular automata, linear feedback shift registers and binary counters. Both methods evaluate the outputs' correctness by means of signature analysis. The test schemes we propose offer a good trade-off between the latency of the test process and the area investment for including the error detection architectures.

[1]  Nisar Ahmed,et al.  Nanometer Technology Designs: High-Quality Delay Tests , 2007 .

[2]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[3]  Vishwani D. Agrawal,et al.  Net diagnosis using stuck-at and transition fault models , 2012, 2012 IEEE 30th VLSI Test Symposium (VTS).

[4]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[5]  Walter Anheier,et al.  On Random Pattern Testability of Cryptographic VLSI Cores , 1999, European Test Workshop 1999 (Cat. No.PR00390).

[6]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[7]  Michael Frankfurter Computer Arithmetic Algorithms And Hardware Implementations , 2016 .

[8]  Flavius Opritoiu,et al.  Pseudo random self-test architecture for Advanced Encryption Standard , 2013, 2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME).

[9]  Cristian Constantinescu,et al.  Impact of deep submicron technology on dependability of VLSI circuits , 2002, Proceedings International Conference on Dependable Systems and Networks.

[10]  Di NataleGiorgio,et al.  Self-test techniques for crypto-devices , 2010 .

[11]  A. Mahmood The State of the Art in Intrusion Prevention and Detection , 2014 .

[12]  Charles E. Stroud A Designer's Guide to Built-In Self-Test , 2002 .

[13]  Sabine Schulze Introduction to VLSI Systems: A Logic, Circuit, and System Perspective , 2011 .

[14]  Giorgio Di Natale,et al.  Self-Test Techniques for Crypto-Devices , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[15]  Jean-Jacques Quisquater,et al.  Faults, Injection Methods, and Fault Attacks , 2007, IEEE Design & Test of Computers.

[16]  Xiaoqing Wen,et al.  VLSI Test Principles and Architectures: Design for Testability (Systems on Silicon) , 2006 .

[17]  Christopher Swenson Modern cryptanalysis - techniques for advanced code breaking , 2008 .