A scan-based attack based on discriminators for AES cryptosystems

Ryuta Nara, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki

    Research output: Contribution to journalArticle

    30 Citations (Scopus)

    Abstract

    A scan chain is one of the most important testing techniques, but it can be used as side-channel attacks against a cryptography LSI. We focus on scan-based attacks, in which scan chains are targeted for side-channel attacks. The conventional scan-based attacks only consider the scan chain composed of only the registers in a cryptography circuit. However, a cryptography LSI usually uses many circuits such as memories, micro processors and other circuits. This means that the conventional attacks cannot be applied to the practical scan chain composed of various types of registers. In this paper, a scan-based attack which enables to decipher the secret key in an AES cryptography LSI composed of an AES circuit and other circuits is proposed. By focusing on bit pattern of the specific register and monitoring its change, our scan-based attack eliminates the influence of registers included in other circuits than AES. Our attack does not depend on scan chain architecture, and it can decipher practical AES cryptography LSIs.

    Original languageEnglish
    Pages (from-to)3229-3237
    Number of pages9
    JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    VolumeE92-A
    Issue number12
    DOIs
    Publication statusPublished - 2009 Dec

    Fingerprint

    Discriminators
    Cryptosystem
    Cryptography
    Attack
    Networks (circuits)
    Side Channel Attacks
    Microprocessor
    Eliminate
    Monitoring
    Data storage equipment
    Testing

    Keywords

    • AES
    • Cryptography
    • Scan chain
    • Scan-based attack
    • Security
    • Side-channel attack
    • Testability

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Computer Graphics and Computer-Aided Design
    • Applied Mathematics
    • Signal Processing

    Cite this

    A scan-based attack based on discriminators for AES cryptosystems. / Nara, Ryuta; Togawa, Nozomu; Yanagisawa, Masao; Ohtsuki, Tatsuo.

    In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 12, 12.2009, p. 3229-3237.

    Research output: Contribution to journalArticle

    @article{75904e752c534f1c914c18cb91609cbf,
    title = "A scan-based attack based on discriminators for AES cryptosystems",
    abstract = "A scan chain is one of the most important testing techniques, but it can be used as side-channel attacks against a cryptography LSI. We focus on scan-based attacks, in which scan chains are targeted for side-channel attacks. The conventional scan-based attacks only consider the scan chain composed of only the registers in a cryptography circuit. However, a cryptography LSI usually uses many circuits such as memories, micro processors and other circuits. This means that the conventional attacks cannot be applied to the practical scan chain composed of various types of registers. In this paper, a scan-based attack which enables to decipher the secret key in an AES cryptography LSI composed of an AES circuit and other circuits is proposed. By focusing on bit pattern of the specific register and monitoring its change, our scan-based attack eliminates the influence of registers included in other circuits than AES. Our attack does not depend on scan chain architecture, and it can decipher practical AES cryptography LSIs.",
    keywords = "AES, Cryptography, Scan chain, Scan-based attack, Security, Side-channel attack, Testability",
    author = "Ryuta Nara and Nozomu Togawa and Masao Yanagisawa and Tatsuo Ohtsuki",
    year = "2009",
    month = "12",
    doi = "10.1587/transfun.E92.A.3229",
    language = "English",
    volume = "E92-A",
    pages = "3229--3237",
    journal = "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",
    issn = "0916-8508",
    publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
    number = "12",

    }

    TY - JOUR

    T1 - A scan-based attack based on discriminators for AES cryptosystems

    AU - Nara, Ryuta

    AU - Togawa, Nozomu

    AU - Yanagisawa, Masao

    AU - Ohtsuki, Tatsuo

    PY - 2009/12

    Y1 - 2009/12

    N2 - A scan chain is one of the most important testing techniques, but it can be used as side-channel attacks against a cryptography LSI. We focus on scan-based attacks, in which scan chains are targeted for side-channel attacks. The conventional scan-based attacks only consider the scan chain composed of only the registers in a cryptography circuit. However, a cryptography LSI usually uses many circuits such as memories, micro processors and other circuits. This means that the conventional attacks cannot be applied to the practical scan chain composed of various types of registers. In this paper, a scan-based attack which enables to decipher the secret key in an AES cryptography LSI composed of an AES circuit and other circuits is proposed. By focusing on bit pattern of the specific register and monitoring its change, our scan-based attack eliminates the influence of registers included in other circuits than AES. Our attack does not depend on scan chain architecture, and it can decipher practical AES cryptography LSIs.

    AB - A scan chain is one of the most important testing techniques, but it can be used as side-channel attacks against a cryptography LSI. We focus on scan-based attacks, in which scan chains are targeted for side-channel attacks. The conventional scan-based attacks only consider the scan chain composed of only the registers in a cryptography circuit. However, a cryptography LSI usually uses many circuits such as memories, micro processors and other circuits. This means that the conventional attacks cannot be applied to the practical scan chain composed of various types of registers. In this paper, a scan-based attack which enables to decipher the secret key in an AES cryptography LSI composed of an AES circuit and other circuits is proposed. By focusing on bit pattern of the specific register and monitoring its change, our scan-based attack eliminates the influence of registers included in other circuits than AES. Our attack does not depend on scan chain architecture, and it can decipher practical AES cryptography LSIs.

    KW - AES

    KW - Cryptography

    KW - Scan chain

    KW - Scan-based attack

    KW - Security

    KW - Side-channel attack

    KW - Testability

    UR - http://www.scopus.com/inward/record.url?scp=77951240521&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=77951240521&partnerID=8YFLogxK

    U2 - 10.1587/transfun.E92.A.3229

    DO - 10.1587/transfun.E92.A.3229

    M3 - Article

    AN - SCOPUS:77951240521

    VL - E92-A

    SP - 3229

    EP - 3237

    JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

    JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

    SN - 0916-8508

    IS - 12

    ER -