Implementation evaluation of scan-based attack against a Trivium cipher circuit

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing. In this paper, we pick up a scan-based attack method against a Trivium cipher, one of synchronous stream ciphers, and evaluate it using the FPGA platform called SASEBO-GII. We implement the Trivium cipher on the FPGA chip and perform the scan-based attack against it. We demonstrate that the scan-based attack can successfully restore the secret information in the FPGA chip within several minutes, even if the FPGA chip contains several circuits other than the Trivium cipher circuit, which reveals that the scan-based attack against the Trivium cipher is not only a simulation threat but a real threat.

    Original languageEnglish
    Title of host publication2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages220-223
    Number of pages4
    ISBN (Electronic)9781509015702
    DOIs
    Publication statusPublished - 2017 Jan 3
    Event2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016 - Jeju, Korea, Republic of
    Duration: 2016 Oct 252016 Oct 28

    Other

    Other2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2016
    CountryKorea, Republic of
    CityJeju
    Period16/10/2516/10/28

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Signal Processing

    Fingerprint Dive into the research topics of 'Implementation evaluation of scan-based attack against a Trivium cipher circuit'. Together they form a unique fingerprint.

    Cite this