Implementation evaluation of scan-based attack against a Trivium cipher circuit

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing. In this paper, we pick up a scan-based attack method against a Trivium cipher, one of synchronous stream ciphers, and evaluate it using the FPGA platform called SASEBO-GII. We implement the Trivium cipher on the FPGA chip and perform the scan-based attack against it. We demonstrate that the scan-based attack can successfully restore the secret information in the FPGA chip within several minutes, even if the FPGA chip contains several circuits other than the Trivium cipher circuit, which reveals that the scan-based attack against the Trivium cipher is not only a simulation threat but a real threat.

    Original languageEnglish
    Title of host publication2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages220-223
    Number of pages4
    ISBN (Electronic)9781509015702
    DOIs
    Publication statusPublished - 2017 Jan 3
    Event2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016 - Jeju, Korea, Republic of
    Duration: 2016 Oct 252016 Oct 28

    Other

    Other2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016
    CountryKorea, Republic of
    CityJeju
    Period16/10/2516/10/28

    Fingerprint

    Field programmable gate arrays (FPGA)
    Networks (circuits)
    Processing

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Signal Processing

    Cite this

    Oku, D., Yanagisawa, M., & Togawa, N. (2017). Implementation evaluation of scan-based attack against a Trivium cipher circuit. In 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016 (pp. 220-223). [7803938] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/APCCAS.2016.7803938

    Implementation evaluation of scan-based attack against a Trivium cipher circuit. / Oku, Daisuke; Yanagisawa, Masao; Togawa, Nozomu.

    2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016. Institute of Electrical and Electronics Engineers Inc., 2017. p. 220-223 7803938.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Oku, D, Yanagisawa, M & Togawa, N 2017, Implementation evaluation of scan-based attack against a Trivium cipher circuit. in 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016., 7803938, Institute of Electrical and Electronics Engineers Inc., pp. 220-223, 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016, Jeju, Korea, Republic of, 16/10/25. https://doi.org/10.1109/APCCAS.2016.7803938
    Oku D, Yanagisawa M, Togawa N. Implementation evaluation of scan-based attack against a Trivium cipher circuit. In 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016. Institute of Electrical and Electronics Engineers Inc. 2017. p. 220-223. 7803938 https://doi.org/10.1109/APCCAS.2016.7803938
    Oku, Daisuke ; Yanagisawa, Masao ; Togawa, Nozomu. / Implementation evaluation of scan-based attack against a Trivium cipher circuit. 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 220-223
    @inproceedings{aba0aeeafbbb4984ae62911a1591b8d2,
    title = "Implementation evaluation of scan-based attack against a Trivium cipher circuit",
    abstract = "Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing. In this paper, we pick up a scan-based attack method against a Trivium cipher, one of synchronous stream ciphers, and evaluate it using the FPGA platform called SASEBO-GII. We implement the Trivium cipher on the FPGA chip and perform the scan-based attack against it. We demonstrate that the scan-based attack can successfully restore the secret information in the FPGA chip within several minutes, even if the FPGA chip contains several circuits other than the Trivium cipher circuit, which reveals that the scan-based attack against the Trivium cipher is not only a simulation threat but a real threat.",
    author = "Daisuke Oku and Masao Yanagisawa and Nozomu Togawa",
    year = "2017",
    month = "1",
    day = "3",
    doi = "10.1109/APCCAS.2016.7803938",
    language = "English",
    pages = "220--223",
    booktitle = "2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",
    address = "United States",

    }

    TY - GEN

    T1 - Implementation evaluation of scan-based attack against a Trivium cipher circuit

    AU - Oku, Daisuke

    AU - Yanagisawa, Masao

    AU - Togawa, Nozomu

    PY - 2017/1/3

    Y1 - 2017/1/3

    N2 - Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing. In this paper, we pick up a scan-based attack method against a Trivium cipher, one of synchronous stream ciphers, and evaluate it using the FPGA platform called SASEBO-GII. We implement the Trivium cipher on the FPGA chip and perform the scan-based attack against it. We demonstrate that the scan-based attack can successfully restore the secret information in the FPGA chip within several minutes, even if the FPGA chip contains several circuits other than the Trivium cipher circuit, which reveals that the scan-based attack against the Trivium cipher is not only a simulation threat but a real threat.

    AB - Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing. In this paper, we pick up a scan-based attack method against a Trivium cipher, one of synchronous stream ciphers, and evaluate it using the FPGA platform called SASEBO-GII. We implement the Trivium cipher on the FPGA chip and perform the scan-based attack against it. We demonstrate that the scan-based attack can successfully restore the secret information in the FPGA chip within several minutes, even if the FPGA chip contains several circuits other than the Trivium cipher circuit, which reveals that the scan-based attack against the Trivium cipher is not only a simulation threat but a real threat.

    UR - http://www.scopus.com/inward/record.url?scp=85011115905&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85011115905&partnerID=8YFLogxK

    U2 - 10.1109/APCCAS.2016.7803938

    DO - 10.1109/APCCAS.2016.7803938

    M3 - Conference contribution

    AN - SCOPUS:85011115905

    SP - 220

    EP - 223

    BT - 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016

    PB - Institute of Electrical and Electronics Engineers Inc.

    ER -