SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012



   Secure Scan Design Using Redundant Scan Register
                                     Sabyasasachee Banerjee1, Pranay Kumar Saha2
                                       1
                                        Department of Computer Science & Engineering,
                              Heritage Institute of Technology, Anandapur, Kolkata, W.B., India,
                                          E-mail: sabyasasachee.banerjee@gmail.com
                                      2
                                        Department of Computer Science & Technology,
                               B. P. C. Institute of Technology, Krishnagar, Nadia, W.B., India,
                                             E-mail: pranay.kumar.saha@gmail.com



Abstract— Cryptographic VLSI chip has a significant role to           The switching between insecure mode and secure mode at
resist the attacks which is the growing customer concern of           any time can be done through a power off reset. But this
hardware security. Redundancy introduces a great amount of            method has the following shortcomings:
randomness & non linearity in any kind circuitry                      a) There are certain devices (example credit cards, cell-phone
(combinational or sequential). We introduce a new type of             sim-cards, and access cards) where even after turning the
redundancy in sequential circuits to make redundant scan
                                                                      power off the information exists inside the chip. This
registers that are indistinguishable with the original scan
registers. They are sequentially undetectable as well as              information can be extracted from those devices having in
redundant, which makes it highly secured. The approach is             the insecure mode.
only to replace the original scan registers to modified               b) Speed testing or on-line testing is not possible.
redundant scan registers called RScR.                                 c) There are critical systems that remain on continuously
                                                                      (like satellite monitoring system). In such cases device’s
Keywords— Functional equivalence, Isomorphic redundancy,              power-off is not possible. Hence testing in such a scenario
RScR                                                                  requires alternative solutions.
                                                                      Karri’s method of secure scan design:
                       I. INTRODUCTION                                Consisting two copies of the secret key:
                                                                           · Secure key: hardwired or in secure memory.
    In the modern era, security of crypto-chips is a major                 · Mirror Key (MKR): used for testing.
concern. Currently, all communication, networking, database           &Two modes of operation: Insecure and Secure
management systems and financial application use                      Insecure mode: secure key is isolated, MKR [1] is used and
cryptographic methods. In crypto chips generally the keys             debug allowed. Secure mode: secure key is used and debug
are stored in the sequential circuits. In order to improve the        disabled. To support the secure-scan DFT architecture, here
testability of sequential circuits scan chains are popularly          MKRs are used to isolate the secret key from the data path
used. But scan chains open side channel for cryptanalysis.            and control path performing the crypto algorithm. Such
With improved control and access to the chip, vulnerability           MKRs work like normal registers during insecure mode, and
to attacks also increases. Due to this, scan chains can be            test vectors can be scanned in and the test result can be
used to steal important information such as intellectual              scanned out. When the circuit is in the secure mode, the
property (IP) and secret keys of cryptographic chips [2, 3].          MKRs load the secret-key information and the contents of
The possibility of scan-based side-channel attacks adds to            MKRs cannot be scanned out until being reset. Here a test
an already growing customer concern of hardware security.             access port (TAP) controller controls the working mode of
Fundamentally, the problem lies on the inherent contradiction         the crypto chip.
between testability and security for digital circuits. Hence,         Partial scan technique using balanced structure: The
there’s a need for an efficient solution such that both               balanced structure [9] is a structure for testable sequential
testability and security are satisfied.                               circuits. We adopt a partial scan to make a kernel balanced,
                                                                      where a kernel is the portion of the circuit excluding the scan
                      II. REVIEW WORK                                 chains. The partial scan protects non-scan registers
    In order to solve this tricky problem of efficiently testing      completely from scan-based attacks. In addition, we introduce
without compromising the security, some techniques have               a mechanism to confuse the kernel logic in test mode to protect
been proposed.                                                        scan registers. The method makes the circuit behavior in test
Lock and Key Technique: In this proposed method [7] scan              mode completely different from normal mode.
chain architecture with mirror key register was used to provide       Vlm-Scan Technique: It is a Vlm-Scan [10] that utilizes some
both testability and security. Two modes of operations                flip-flops in a scan chain for authentication to move to test
introduced, insecure mode and secured mode. In the insecure           mode. The circuit can proceed to test mode only if the proper
mode, crypto chip can be switched between the test mode               sequence of test keys are scanned in to the used flip-flops. It
and the normal mode. However, when a crypto chip is in the            is better because the test controller can be tested; however,
secure mode, it can only stay in the normal mode.                     a long test key sequence is still needed.
© 2012 ACEEE                                                     21
DOI: 01.IJSIP.03.01.81
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


                        III. PRELEMINARIES
A. de Bruijn graph:
A de Bruijn graph represents a state transition graph of a
shift register. Shown in Fig.1




                                                                                                 Fig.4 Isomorphic Redundancy
                      Fig1. abc1 Scan register                                  As in Fig.4 state S1 is just swapped by the S0 state but input
The corresponding de Bruijn graph and state table are shown                     and output assignments remains as it is same so this is an
in Fig. 2 and Table 1 respectively                                              example of isomorphic redundancy. So an isomorphic
                                                                                redundant circuit is functionally equivalent also.
                                   TABLEI . STATE TABLE   OF FIG.1


                                                                                                   IV. PROPOSED WORK
                                                                                    We proposed a new type of redundancy in the shift
                                                                                register. Here not only swapping of sates is achieved but
                                                                                also all the original sequences are negated keeping all the
                                                                                input & output assignments same. That is we will get same
                                                                                output as original scan registers providing the same
                                                                                corresponding Input. Later one much more randomized
                                                                                redundancy is introduced, where the swapping of all the states
                                                                                is randomized to some extent & similarly all the input output
                                                                                assignments remains as it is same as original scan register.
                                                                                The scan registers where these type redundancies are
                                                                                implemented are called as redundant shift registers (RSR)
     Fig2. de Bruijn graph                                                      that are functionally equivalent but not structurally equivalent
                                                                                to original scan registers. Using the redundant scan registers
B. Functional Equivalence:
                                                                                (RScR), we present a new secure and testable scan design
A k-stage modified shift register is called functionally
                                                                                approach which satisfies both testability and security of
equivalent [6] to the k-stage shift register if the de Bruijn
                                                                                digital circuits. The approach is only to replace the original
graph of the modified shift register is isomorphic to that of
                                                                                scan registers to modified scan registers called redundant
the shift register and the input and output assignments are
                                                                                scan registers (RScR).It also have two modes in which the
the same as those of the shift register. (State assignment is
                                                                                circuitry is operated. One is test mode and another one is
not necessarily the same.) The functional equivalent de Bruijn
                                                                                system mode, by adding an extra input called control input
graph of Fig. 2 is shown in Fig. 3
                                                                                which switches the circuit between test mode and system
                                                                                mode .When set 0 to control input the circuitry switches to
                                                                                test mode and a tester can check the original sequences of
                                                                                the scan register and when set 1 to control input circuitry
                                                                                switches to system mode and the circuitry transferred to be
                                                                                redundant, states are swapped and the original sequences of
                                                                                the scan registers are negated.
                                                                                A.R EDUNDANCY & RSCR (REDUNDANT SCAN REGISTER)




                Fig3. Functional equivalent de Bruijn graph
C. Isomorphic redundancy:                                                                         Fig5. abc2 Scan register
 An isomorphic redundancy can be easily designed by a
simple permutation of the states in the state table of a                        Fig.5 shows the Redundant Scan register (RScR) which is
sequential circuit. It will be functionally identical to that of                functionally equivalent to the Scan register shown in Fig.1.
the original register but structurally different [4].                            As a result states will be swapped & sequences of original


© 2012 ACEEE                                                               22
DOI: 01.IJSIP.03.01.81
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


scan registers are negated which we have implemented in                  so then we propose another type of improved redundant
system mode and in test mode sequence remains as it is same              design which increases the randomness of the changing of
as original scan register of Fig. 1 is represented by the de             the sequences of scan registers. Like previous design it
Bruijn graph. Where the state in test mode and system mode               also consist two types of inputs depending on the control
are shown in Fig. 6 as state in test mode /state in system mode          input, it switches between testing mode and system mode,
fashion.                                                                 when control input (Y) is 0 this circuit moves to the testing
                                                                         mode and when control input (Y) is 1 it moves to system
                                                                         mode is shown in Fig. 7.




                                                                                              Fig7. abc3 Scan register

                                                                         The corresponding de Bruijn graph of this RScR is in Fig.8.
 Fig.6 de Bruijn graph of fig. 5 in test mode/system mode fashion
                                                                         The state in test mode and system mode are shown in Fig.8
The corresponding state table in test mode and system mode               State as in test mode /state in system mode fashion.
are illustrated in Table 2 and Table 3.
                  TABLEII. STATE TABLE IN TEST MODE




                                                                          Fig8. de Bruijn graph of fig7. in test mode/system mode fashion
                TABLEIII. STATE TABLE IN SYSTEM MODE                     The state table in test mode and system mode illustrated in
                                                                         Table 4 and Table 5 respectively.
                                                                                          TABLE IV: STATE TABLE IN TEST MODE




 But from security point of view it seems to be not so secured
as if an intelligent hacker goes through the statistics of the
state table for large number of times then he can eventually
find that states are changed as the first two bits are negated,
© 2012 ACEEE                                                        23
DOI: 01.IJSIP.03.01.81
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012

                 TABLE V: STATE TABLE IN SYSTEM MODE




    So in the test mode the circuit operates as the original                                 Fig10. Implementation of RScR
normal shift register circuit in Fig. 1, so a tester can effectively        The scan register with the redundant shift register as shown
check the circuit for testing. Now from Fig. 8 it is obseved                in fig. 10 is called the redundant scan register (RScR). Scan
that the sequences of the sequential circuit is one bit or in               chains are proven to be effective in improvingthe testability
some cases two bit differnciating means often first one bit is              of digital circuits. But as it possesses full controllability and
negated or two bit is negated and from the state table we can               observability on the circuit, which allow attackers to exploit
find that swaping is also randomized , there is no certain rule             this opportunity to extract key streams and even, manipulate
for swaping the sequences of the shift register, so an                      the circuit. This makes it difficult for scan chains to be used
intelligent hacker can never get any chance to hack in the                  especially in special cryptographic circuits where secret key
scan chain.                                                                 streams are stored in internal registers, thus a problem in
B. RScR Added Scan Tree                                                     testing these types of circuits is imminent. However, quality
                                                                            of these circuits is highly in demand currently due to the
Now as we know any scan chain can be represented by a tree
                                                                            increasing need of secure systems. Thus secure scan design
shaped structure [5].
                                                                            through (RScR) provides both security and testability. With
                                                                            the same effectiveness and efficiency of conventional scan
                                                                            design and with very minimal overhead, any digital circuit
                                                                            can be both easily testable and secure against attackers.
                                                                            When we consider a secure scan design, we need to assume
                                                                            what the attacker knows and how he can potentially make
                                                                            the attack. Here, we assume the following.
                                                                            A. ATTACKER’S KNOWLEDGE
                                                                            a) The attacker does not know the detailed information in the
                   Fig9. Tree shaped scan chain
                                                                            gate-level design.
If we replace the circled 3 state scan register of fig. 9 by RScR           b) The attacker knows the cryptographic algorithm
(abc3 scan register) as a result randomness and nonlinearity                implemented in the circuit. So he can make bit-change
both will be introduced. The modified scan tree structure                   insertion attack or differential values attack [1].
consists of both redundant and normal Scan D-flip-flops.                    c) The attacker knows the presence of test pins (scan-in/out,
The new scan tree continues to provide same amount of                       scan, and reset) and scan chains. However, he does not know
controllability and observability to the designer but not to                the structure of RScR (the connection information, positions
the attacker. As the structure of the RScR and the structure of             of XOR and NOT, and the size) and the presence of the control
the scan tree are not known to the attacker. This makes it                  pin .Based on the above assumptions, we define the security
hard for the attacker to comprehend the structure of the tree.              to prevent scan-based side-channel attacks.
Further the new scan tree does not require an on-chip source                The structure of the RScR is important to the attacker in order
or sink.                                                                    to understand the scanned out values from the registers,
               V. SECURITY & TESTABILITY                                    which can reveal the key stream or the initial values of the
A circuit may consist of a single or multiple scan registers                internal registers, once computed. Thus, the level of security
and the remaining combinational logic circuit (kernel) [9]. A               is dependent on the difficulty of determining the RScR
scan register is nothing but a shift register with multiplexers             structure. If the attacker cannot identify the structure of the
that select the normal data from the combinational logic circuit            RScR, the internal register values cannot be retrieved as
and the shifting data from the preceding flip-flop. Here, we                output would remain the same as it would for conventional
have replaced the shift register with a redundant shift register            scan fig. 6 and fig. 8 shows the de Bruijn graph of two
(RSR).                                                                      different types of RScR (abc2, abc3). that are all functionally
© 2012 ACEEE                                                           24
DOI: 01.IJSIP.03.01. 81
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


equivalent to the 3-stage shift register but their state                byte. From the number of 1’s in the XOR of the scanned out
assignments are different and hence the content of each                 values of the register R and differential property of the AES
register cannot be observed from the input/output se-                   algorithm, the values of register b was computed. Finally,
quence in system mode while served to the customers.                    using value of a and the register b the key value was
                                                                        calculated using: RK0=B Å A. In our RScR added scan chain
B. SECURITY ANALYSIS OF STREAM CIPHER WITH RSR ADDED-SCAN
                                                                        architecture such an attack is not viable because of the
TREE :
                                                                        presence of the RScR and the nonlinear scan tree. The
Now in case of stream cipher the structure of scan chain can
                                                                        security of the structure is due to the following reasons:
be determined only if the user feeds in values of his choice
                                                                        Attacker cannot ascertain the position of register R due to
and analyze the scan out data. Now with RSR added scan
                                                                        the unknown linear structure of the scan tree. The presence
tree structure the attacker is deprived of knowing the
                                                                        of RSR in the scan path does not allow ascertaining the
sequences of the scan chain.
                                                                        structure of the tree. This is because the attacker has no
C. SECURITY A NALYSIS OF AES WITH RSR ADDED-SCAN TREE :                 control over the input to the internal structures of the design
AES is an encryption standard used by the U.S. government               until he knows the full structure of the RSR added scan tree.
since 2001. It is now one of the most popular block cipher              Since step 1 fails, step 2 cannot be performed. Also, it may be
techniques due to its simple implementation in hardware. Each           noted that step 2 is also not possible. This is because the
AES [8] encryption includes several rounds, and each round              attacker requires computing differences in the scanned out
consists of four basic operations:                                      values of register R, which is now obscured by the non-
a) The Byte Sub Transformation;                                         linear property of the RSR added-scan tree. Hence the system
b) Shift Row Transformation;                                            is secure against the known scan chain based attacks.
c) Mix Column Transformation and
d) Add Round Key.                                                         VI. THE ADVANTAGES OF RSCR ADDED SCAN TREE
In the last operation, Add Round Key, data is exclusive- ORed
                                                                        Apart from providing high securities to the designs, following
with a predefined encryption key. The length of the encryption
                                                                        are enlisted the other advantages of the RScR added scan
key can be chosen as 128, 196, or 256 bits. AES algorithm is a
                                                                        tree.
private key encryption, which means the encryption key
                                                                        Fast Testing: Due to the tree structure the testing is fast.
(same as the decryption key) is between the transmitter and
                                                                        High Fault coverage: The RScR added scan chain has the
the receiver only. Any leakage of the encryption key results
                                                                        same amount of controllability and observability as
in a serious security problem. Conventional block ciphers
                                                                        conventional scan chain for the designer. Since the designer
like AES are insecure under scan chain based attacks [1]. In
                                                                        don’t have to aware of the positions of the RScR in the RScR
order to prevent scan based attacks on AES, we have inserted
                                                                        added scan tree structure as in test mode he will get the
the RScR added scan tree for registers that need to be secured
                                                                        original sequences as an original shift register, he can easily
in AES hardware. In the following we show that the RScR
                                                                        feed in patterns and observe the intermediate values of the
added scan tree architecture provides high security with very
                                                                        system and thereby test the system accurately.
low overhead.
                                                                        On-line testing is possible: There is no need of turning off
                                                                        the system before testing the circuit unlike in the case of
                                                                        secure scan architecture
                                                                        Testing of additional circuits or inverters is easy: Since the
                                                                        additional circuitry involves combinational units, testing can
                                                                        be easily performed.

                                                                        VII.THE PROBABILITY OF DETERMINING THE STRUCTURE OF THE
                                                                                         RSR ADDED SCAN TREE
                                                                        The probability of guessing the correct structure of the scan
                                                                        tree is [5]

            Fig.11 Round Operation of AES encryption
Now the attack on AES by [6] only can crack if it gets the
following information: The first step is to guess the position          The probability of guessing the correct structure of the RScR
of the registers to obtain intermediate values of each step.            is
The main motive is to find the position of the register R in the
above figure by exploiting the property of Avalanche effect
in good ciphers. Once, the position of register R was                   as the hacker knows nothing about length of our RScR or
ascertained the second step comes to play. In this step, two            about the degree of RScR , then he has to try exhaustively all
values of input plaintext were chosen which differs in one              bit sequences of lengths 1 to K .

© 2012 ACEEE                                                       25
DOI: 01.IJSIP.03.01.81
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


Hence the total probability of guessing the correct structure                                   REFERENCES
of the RScR added scan tree is
                                                                      [1] Bo Yang, Kaijie Wu, and Ramesh Karri “Secure Scan: A Design-
                                                                      for-Test Architecture for Crypto Chips” Publication Year: 2006,
                                                                      Page(s): 2287 - 2293.
                                                                      [2] David Hély1&2, Frédéric Bancel1, Marie-Lise Flottes2, Bruno
                                                                      Rouzeyre 2 “Test Control for Secure Scan Designs” Publication
 Where                                                                Year: 2005, Page(s): 190 – 195.
  N: Is the number of scan output pins                                [3] David Hély1, Marie-Lise Flottes2, Frédéric Bancel1, Bruno
  L: Is the depth of the scan tree                                    Rouzeyre2, Nicolas Bérard1, and MichelRenovell2.”Scan Design
  r: Is the number of nodes                                           and Secure Chip” Publication Year: 2004, Page(s): 219 – 224.
 K: Is the K stage shift register                                     [4] Debesh K. Das, Uttam K. Bhattacharya, andBhargab B.
                                                                      Bhattacharya,”Isomorph-Redundancy in Sequential Circuits”
            VIII. AREA COST & TEST POWER                              Publication Year: 2000 , Page(s): 992 - 997.
                                                                      [5] Gaurav Sengar, Debdeep Mukhopadhayay, D Roy Chowdhury
To reduce the overhead due to many feed-forwards and                  “An Efficient Approach to Develop Secure Scan Tree for Crypto-
feedbacks in a long scan chain, we can use a shift register           Hardware” Publication Year: 2007, Page(s): 21 – 26.
(standard scan register) for the non-secure part that is not          [6] Hideo Fujiwara and Marie Engelene J. Obien “Secure and
required to be scan-secure. As for the influence on test power        Testable Scan Design Using Extended de Bruijn Graphs” Publication
due to shift register modification, the insertion of inverters        Year: 2010, Page(s): 413 – 418.
                                                                      [7] Jeremy Lee, Mohammed Tehranipoor, Chintan Patel, and Jim
AND/OR/ XOR gates can reduce test power even more than
                                                                      Plusquellic “Securing Scan Design Using Lock & Key Technique”
standard scan design if they are inserted appropriately as
                                                                      Publication Year: 2005, Page(s): 51 – 62.
mentioned.                                                            [8] J. Daemen and R. Rijmen, “The Design of Rijndael: AES—The
                                                                      Advance Encryption Standard.” Berlin, Germany: Springer-Verlag,
                         CONCLUSION                                   2002, pp. 31–62.
                                                                      [9] Michiko Inoue Tomokazu Yoneda Muneo Hasegawa Hideo
A new secure scan design has been introduced. It involves
                                                                      Fujiwara “Partial Scan Approach for Secret Information Protection
modification of original scan registers of scan design to             “ Publication Year: 2009, Page(s): 143 – 148.
redundant scan registers (RScR). One type has been analyzed           [10] Somnath Paul, Rajat Subhra Chakraborty and Swarup Bhunia
for scan-testability and scan-security.RScR added scan tree           “VIm-Scan: A Low Overhead Scan Design Approach for Protection
of a shift register can be both scan-testable and –secure by          of Secret Key in Scan-Based Secure Chips” Publication Year: 2007,
adding one extra control line input. A long secure scan chain         Page(s): 455 – 460.
can be easily constructed by cascading short scan-testable
and scan-secure redundant shift registers. It also does not
involve the use of additional key streams. Therefore, it
provides an efficient solution to satisfy both testability and
security with lesser cost.




© 2012 ACEEE                                                     26
DOI: 01.IJSIP.03.01.81

Weitere ähnliche Inhalte

Was ist angesagt?

29. continuous neighbor discovery in asynchronous sensor networks
29. continuous neighbor discovery in asynchronous sensor networks29. continuous neighbor discovery in asynchronous sensor networks
29. continuous neighbor discovery in asynchronous sensor networksakshuu16
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...wtyru1989
 
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...Lviv Startup Club
 
Networked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessNetworked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessMarzieh Nabi
 
Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...
Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...
Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...IDES Editor
 
Spiking Neural P System
Spiking Neural P SystemSpiking Neural P System
Spiking Neural P SystemAtit Gaonkar
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Was ist angesagt? (9)

29. continuous neighbor discovery in asynchronous sensor networks
29. continuous neighbor discovery in asynchronous sensor networks29. continuous neighbor discovery in asynchronous sensor networks
29. continuous neighbor discovery in asynchronous sensor networks
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...
 
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...
 
Networked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and RandomnessNetworked Dynamic Systems: Identification, Controllability, and Randomness
Networked Dynamic Systems: Identification, Controllability, and Randomness
 
10307021
1030702110307021
10307021
 
Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...
Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...
Spiking Neural Networks As Continuous-Time Dynamical Systems: Fundamentals, E...
 
Spiking Neural P System
Spiking Neural P SystemSpiking Neural P System
Spiking Neural P System
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

Andere mochten auch

Enfermedades de transmisión sexual
Enfermedades de transmisión sexualEnfermedades de transmisión sexual
Enfermedades de transmisión sexualrogercuaical
 
Semana Cultural IES Concha Méndez Cuesta
Semana Cultural IES Concha Méndez CuestaSemana Cultural IES Concha Méndez Cuesta
Semana Cultural IES Concha Méndez CuestaPALMIRA ARAGONÉS RUBIO
 
Presentació a .tecno del catedràtic d'Ecologia Joandomènc Ros
Presentació a .tecno del catedràtic d'Ecologia Joandomènc RosPresentació a .tecno del catedràtic d'Ecologia Joandomènc Ros
Presentació a .tecno del catedràtic d'Ecologia Joandomènc RosEcotendències Cosmocaixa
 
Free UK UFO National Archives Documents
Free UK UFO National Archives DocumentsFree UK UFO National Archives Documents
Free UK UFO National Archives Documentsalienuforesearch
 
Climate change and food security
Climate change and food securityClimate change and food security
Climate change and food securitytshering wangmo
 
45v09n protocolo 4a13038351pdf001
45v09n protocolo 4a13038351pdf00145v09n protocolo 4a13038351pdf001
45v09n protocolo 4a13038351pdf001Gerson Olivares
 
PineBreeze Newspaper
PineBreeze NewspaperPineBreeze Newspaper
PineBreeze NewspaperDrew F
 
201309091527300.prueba final 2_basico_lenguaje_periodo4
201309091527300.prueba final 2_basico_lenguaje_periodo4201309091527300.prueba final 2_basico_lenguaje_periodo4
201309091527300.prueba final 2_basico_lenguaje_periodo4madelin villalobos
 
The lesson of basic Croatian prepared by local students.
The lesson of basic Croatian prepared by local students.The lesson of basic Croatian prepared by local students.
The lesson of basic Croatian prepared by local students.OLEtark
 
Catalogo Q1 2013 ES Spanish
Catalogo Q1 2013 ES SpanishCatalogo Q1 2013 ES Spanish
Catalogo Q1 2013 ES SpanishLED lighting
 
SAP Alfresco Integration For The Public Sector With Ctac
SAP Alfresco Integration For The Public Sector With CtacSAP Alfresco Integration For The Public Sector With Ctac
SAP Alfresco Integration For The Public Sector With CtacAlfresco Software
 
Completa las-consonantes-que-faltan-recortando-y-pegando
Completa las-consonantes-que-faltan-recortando-y-pegandoCompleta las-consonantes-que-faltan-recortando-y-pegando
Completa las-consonantes-que-faltan-recortando-y-pegandoMariela Herrera Mora
 

Andere mochten auch (20)

Enfermedades de transmisión sexual
Enfermedades de transmisión sexualEnfermedades de transmisión sexual
Enfermedades de transmisión sexual
 
Semana Cultural IES Concha Méndez Cuesta
Semana Cultural IES Concha Méndez CuestaSemana Cultural IES Concha Méndez Cuesta
Semana Cultural IES Concha Méndez Cuesta
 
Presentació a .tecno del catedràtic d'Ecologia Joandomènc Ros
Presentació a .tecno del catedràtic d'Ecologia Joandomènc RosPresentació a .tecno del catedràtic d'Ecologia Joandomènc Ros
Presentació a .tecno del catedràtic d'Ecologia Joandomènc Ros
 
Free UK UFO National Archives Documents
Free UK UFO National Archives DocumentsFree UK UFO National Archives Documents
Free UK UFO National Archives Documents
 
Climate change and food security
Climate change and food securityClimate change and food security
Climate change and food security
 
45v09n protocolo 4a13038351pdf001
45v09n protocolo 4a13038351pdf00145v09n protocolo 4a13038351pdf001
45v09n protocolo 4a13038351pdf001
 
PineBreeze Newspaper
PineBreeze NewspaperPineBreeze Newspaper
PineBreeze Newspaper
 
201309091527300.prueba final 2_basico_lenguaje_periodo4
201309091527300.prueba final 2_basico_lenguaje_periodo4201309091527300.prueba final 2_basico_lenguaje_periodo4
201309091527300.prueba final 2_basico_lenguaje_periodo4
 
Diapositiva des contaminacion
Diapositiva des contaminacionDiapositiva des contaminacion
Diapositiva des contaminacion
 
Boletín Oficial 2014-04-15
Boletín Oficial 2014-04-15Boletín Oficial 2014-04-15
Boletín Oficial 2014-04-15
 
TodoJaen 44 Navidad 2014
TodoJaen 44 Navidad 2014TodoJaen 44 Navidad 2014
TodoJaen 44 Navidad 2014
 
The lesson of basic Croatian prepared by local students.
The lesson of basic Croatian prepared by local students.The lesson of basic Croatian prepared by local students.
The lesson of basic Croatian prepared by local students.
 
Catalogo Q1 2013 ES Spanish
Catalogo Q1 2013 ES SpanishCatalogo Q1 2013 ES Spanish
Catalogo Q1 2013 ES Spanish
 
Exposición huamachuco
Exposición huamachucoExposición huamachuco
Exposición huamachuco
 
VirtualizacióN Orientada Al Servicio. Ntt Europe Online V1
VirtualizacióN Orientada Al Servicio. Ntt Europe Online V1VirtualizacióN Orientada Al Servicio. Ntt Europe Online V1
VirtualizacióN Orientada Al Servicio. Ntt Europe Online V1
 
Ruby Coding Dojo
Ruby Coding DojoRuby Coding Dojo
Ruby Coding Dojo
 
La Soledad
La SoledadLa Soledad
La Soledad
 
Immobilien Kroatien / Insel Krk - Rustikale Schönheit in ruhiger Lage mit ein...
Immobilien Kroatien / Insel Krk - Rustikale Schönheit in ruhiger Lage mit ein...Immobilien Kroatien / Insel Krk - Rustikale Schönheit in ruhiger Lage mit ein...
Immobilien Kroatien / Insel Krk - Rustikale Schönheit in ruhiger Lage mit ein...
 
SAP Alfresco Integration For The Public Sector With Ctac
SAP Alfresco Integration For The Public Sector With CtacSAP Alfresco Integration For The Public Sector With Ctac
SAP Alfresco Integration For The Public Sector With Ctac
 
Completa las-consonantes-que-faltan-recortando-y-pegando
Completa las-consonantes-que-faltan-recortando-y-pegandoCompleta las-consonantes-que-faltan-recortando-y-pegando
Completa las-consonantes-que-faltan-recortando-y-pegando
 

Ähnlich wie Secure Scan Design Using Redundant Scan Register

Multi Supply Digital Layout
Multi Supply Digital LayoutMulti Supply Digital Layout
Multi Supply Digital LayoutRégis SANTONJA
 
2012EE10432_Abhishek_Lal
2012EE10432_Abhishek_Lal2012EE10432_Abhishek_Lal
2012EE10432_Abhishek_LalAbhishek Lal
 
Mixed signal verification challenges
Mixed signal verification challengesMixed signal verification challenges
Mixed signal verification challengesRégis SANTONJA
 
A Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksA Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksIDES Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...IJCI JOURNAL
 
Scan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature RegistersScan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature RegistersIJMER
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
 
Re usable continuous-time analog sva assertions
Re usable continuous-time analog sva assertionsRe usable continuous-time analog sva assertions
Re usable continuous-time analog sva assertionsRégis SANTONJA
 
An introduction to scan test for test engineers
An introduction to scan test for test engineersAn introduction to scan test for test engineers
An introduction to scan test for test engineersMohit Mongia
 
Systematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage AnalysisSystematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage AnalysisIDES Editor
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
 
Scalable Data Storage Getting You Down? To The Cloud!
Scalable Data Storage Getting You Down? To The Cloud!Scalable Data Storage Getting You Down? To The Cloud!
Scalable Data Storage Getting You Down? To The Cloud!Mikhail Panchenko
 
Scalable Data Storage Getting you Down? To the Cloud!
Scalable Data Storage Getting you Down? To the Cloud!Scalable Data Storage Getting you Down? To the Cloud!
Scalable Data Storage Getting you Down? To the Cloud!Mikhail Panchenko
 
Level sensitive scan design(LSSD) and Boundry scan(BS)
Level sensitive scan design(LSSD) and Boundry scan(BS)Level sensitive scan design(LSSD) and Boundry scan(BS)
Level sensitive scan design(LSSD) and Boundry scan(BS)Praveen Kumar
 

Ähnlich wie Secure Scan Design Using Redundant Scan Register (20)

Publication
PublicationPublication
Publication
 
Multi Supply Digital Layout
Multi Supply Digital LayoutMulti Supply Digital Layout
Multi Supply Digital Layout
 
2012EE10432_Abhishek_Lal
2012EE10432_Abhishek_Lal2012EE10432_Abhishek_Lal
2012EE10432_Abhishek_Lal
 
Mixed signal verification challenges
Mixed signal verification challengesMixed signal verification challenges
Mixed signal verification challenges
 
A Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksA Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
ijseas20150367
ijseas20150367ijseas20150367
ijseas20150367
 
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
 
Scan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature RegistersScan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature Registers
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 
Re usable continuous-time analog sva assertions
Re usable continuous-time analog sva assertionsRe usable continuous-time analog sva assertions
Re usable continuous-time analog sva assertions
 
An introduction to scan test for test engineers
An introduction to scan test for test engineersAn introduction to scan test for test engineers
An introduction to scan test for test engineers
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
Systematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage AnalysisSystematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage Analysis
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 
ADC
ADCADC
ADC
 
Scalable Data Storage Getting You Down? To The Cloud!
Scalable Data Storage Getting You Down? To The Cloud!Scalable Data Storage Getting You Down? To The Cloud!
Scalable Data Storage Getting You Down? To The Cloud!
 
Scalable Data Storage Getting you Down? To the Cloud!
Scalable Data Storage Getting you Down? To the Cloud!Scalable Data Storage Getting you Down? To the Cloud!
Scalable Data Storage Getting you Down? To the Cloud!
 
Level sensitive scan design(LSSD) and Boundry scan(BS)
Level sensitive scan design(LSSD) and Boundry scan(BS)Level sensitive scan design(LSSD) and Boundry scan(BS)
Level sensitive scan design(LSSD) and Boundry scan(BS)
 
Ft3111351140
Ft3111351140Ft3111351140
Ft3111351140
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Secure Scan Design Using Redundant Scan Register

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Secure Scan Design Using Redundant Scan Register Sabyasasachee Banerjee1, Pranay Kumar Saha2 1 Department of Computer Science & Engineering, Heritage Institute of Technology, Anandapur, Kolkata, W.B., India, E-mail: sabyasasachee.banerjee@gmail.com 2 Department of Computer Science & Technology, B. P. C. Institute of Technology, Krishnagar, Nadia, W.B., India, E-mail: pranay.kumar.saha@gmail.com Abstract— Cryptographic VLSI chip has a significant role to The switching between insecure mode and secure mode at resist the attacks which is the growing customer concern of any time can be done through a power off reset. But this hardware security. Redundancy introduces a great amount of method has the following shortcomings: randomness & non linearity in any kind circuitry a) There are certain devices (example credit cards, cell-phone (combinational or sequential). We introduce a new type of sim-cards, and access cards) where even after turning the redundancy in sequential circuits to make redundant scan power off the information exists inside the chip. This registers that are indistinguishable with the original scan registers. They are sequentially undetectable as well as information can be extracted from those devices having in redundant, which makes it highly secured. The approach is the insecure mode. only to replace the original scan registers to modified b) Speed testing or on-line testing is not possible. redundant scan registers called RScR. c) There are critical systems that remain on continuously (like satellite monitoring system). In such cases device’s Keywords— Functional equivalence, Isomorphic redundancy, power-off is not possible. Hence testing in such a scenario RScR requires alternative solutions. Karri’s method of secure scan design: I. INTRODUCTION Consisting two copies of the secret key: · Secure key: hardwired or in secure memory. In the modern era, security of crypto-chips is a major · Mirror Key (MKR): used for testing. concern. Currently, all communication, networking, database &Two modes of operation: Insecure and Secure management systems and financial application use Insecure mode: secure key is isolated, MKR [1] is used and cryptographic methods. In crypto chips generally the keys debug allowed. Secure mode: secure key is used and debug are stored in the sequential circuits. In order to improve the disabled. To support the secure-scan DFT architecture, here testability of sequential circuits scan chains are popularly MKRs are used to isolate the secret key from the data path used. But scan chains open side channel for cryptanalysis. and control path performing the crypto algorithm. Such With improved control and access to the chip, vulnerability MKRs work like normal registers during insecure mode, and to attacks also increases. Due to this, scan chains can be test vectors can be scanned in and the test result can be used to steal important information such as intellectual scanned out. When the circuit is in the secure mode, the property (IP) and secret keys of cryptographic chips [2, 3]. MKRs load the secret-key information and the contents of The possibility of scan-based side-channel attacks adds to MKRs cannot be scanned out until being reset. Here a test an already growing customer concern of hardware security. access port (TAP) controller controls the working mode of Fundamentally, the problem lies on the inherent contradiction the crypto chip. between testability and security for digital circuits. Hence, Partial scan technique using balanced structure: The there’s a need for an efficient solution such that both balanced structure [9] is a structure for testable sequential testability and security are satisfied. circuits. We adopt a partial scan to make a kernel balanced, where a kernel is the portion of the circuit excluding the scan II. REVIEW WORK chains. The partial scan protects non-scan registers In order to solve this tricky problem of efficiently testing completely from scan-based attacks. In addition, we introduce without compromising the security, some techniques have a mechanism to confuse the kernel logic in test mode to protect been proposed. scan registers. The method makes the circuit behavior in test Lock and Key Technique: In this proposed method [7] scan mode completely different from normal mode. chain architecture with mirror key register was used to provide Vlm-Scan Technique: It is a Vlm-Scan [10] that utilizes some both testability and security. Two modes of operations flip-flops in a scan chain for authentication to move to test introduced, insecure mode and secured mode. In the insecure mode. The circuit can proceed to test mode only if the proper mode, crypto chip can be switched between the test mode sequence of test keys are scanned in to the used flip-flops. It and the normal mode. However, when a crypto chip is in the is better because the test controller can be tested; however, secure mode, it can only stay in the normal mode. a long test key sequence is still needed. © 2012 ACEEE 21 DOI: 01.IJSIP.03.01.81
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 III. PRELEMINARIES A. de Bruijn graph: A de Bruijn graph represents a state transition graph of a shift register. Shown in Fig.1 Fig.4 Isomorphic Redundancy Fig1. abc1 Scan register As in Fig.4 state S1 is just swapped by the S0 state but input The corresponding de Bruijn graph and state table are shown and output assignments remains as it is same so this is an in Fig. 2 and Table 1 respectively example of isomorphic redundancy. So an isomorphic redundant circuit is functionally equivalent also. TABLEI . STATE TABLE OF FIG.1 IV. PROPOSED WORK We proposed a new type of redundancy in the shift register. Here not only swapping of sates is achieved but also all the original sequences are negated keeping all the input & output assignments same. That is we will get same output as original scan registers providing the same corresponding Input. Later one much more randomized redundancy is introduced, where the swapping of all the states is randomized to some extent & similarly all the input output assignments remains as it is same as original scan register. The scan registers where these type redundancies are implemented are called as redundant shift registers (RSR) Fig2. de Bruijn graph that are functionally equivalent but not structurally equivalent to original scan registers. Using the redundant scan registers B. Functional Equivalence: (RScR), we present a new secure and testable scan design A k-stage modified shift register is called functionally approach which satisfies both testability and security of equivalent [6] to the k-stage shift register if the de Bruijn digital circuits. The approach is only to replace the original graph of the modified shift register is isomorphic to that of scan registers to modified scan registers called redundant the shift register and the input and output assignments are scan registers (RScR).It also have two modes in which the the same as those of the shift register. (State assignment is circuitry is operated. One is test mode and another one is not necessarily the same.) The functional equivalent de Bruijn system mode, by adding an extra input called control input graph of Fig. 2 is shown in Fig. 3 which switches the circuit between test mode and system mode .When set 0 to control input the circuitry switches to test mode and a tester can check the original sequences of the scan register and when set 1 to control input circuitry switches to system mode and the circuitry transferred to be redundant, states are swapped and the original sequences of the scan registers are negated. A.R EDUNDANCY & RSCR (REDUNDANT SCAN REGISTER) Fig3. Functional equivalent de Bruijn graph C. Isomorphic redundancy: Fig5. abc2 Scan register An isomorphic redundancy can be easily designed by a simple permutation of the states in the state table of a Fig.5 shows the Redundant Scan register (RScR) which is sequential circuit. It will be functionally identical to that of functionally equivalent to the Scan register shown in Fig.1. the original register but structurally different [4]. As a result states will be swapped & sequences of original © 2012 ACEEE 22 DOI: 01.IJSIP.03.01.81
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 scan registers are negated which we have implemented in so then we propose another type of improved redundant system mode and in test mode sequence remains as it is same design which increases the randomness of the changing of as original scan register of Fig. 1 is represented by the de the sequences of scan registers. Like previous design it Bruijn graph. Where the state in test mode and system mode also consist two types of inputs depending on the control are shown in Fig. 6 as state in test mode /state in system mode input, it switches between testing mode and system mode, fashion. when control input (Y) is 0 this circuit moves to the testing mode and when control input (Y) is 1 it moves to system mode is shown in Fig. 7. Fig7. abc3 Scan register The corresponding de Bruijn graph of this RScR is in Fig.8. Fig.6 de Bruijn graph of fig. 5 in test mode/system mode fashion The state in test mode and system mode are shown in Fig.8 The corresponding state table in test mode and system mode State as in test mode /state in system mode fashion. are illustrated in Table 2 and Table 3. TABLEII. STATE TABLE IN TEST MODE Fig8. de Bruijn graph of fig7. in test mode/system mode fashion TABLEIII. STATE TABLE IN SYSTEM MODE The state table in test mode and system mode illustrated in Table 4 and Table 5 respectively. TABLE IV: STATE TABLE IN TEST MODE But from security point of view it seems to be not so secured as if an intelligent hacker goes through the statistics of the state table for large number of times then he can eventually find that states are changed as the first two bits are negated, © 2012 ACEEE 23 DOI: 01.IJSIP.03.01.81
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 TABLE V: STATE TABLE IN SYSTEM MODE So in the test mode the circuit operates as the original Fig10. Implementation of RScR normal shift register circuit in Fig. 1, so a tester can effectively The scan register with the redundant shift register as shown check the circuit for testing. Now from Fig. 8 it is obseved in fig. 10 is called the redundant scan register (RScR). Scan that the sequences of the sequential circuit is one bit or in chains are proven to be effective in improvingthe testability some cases two bit differnciating means often first one bit is of digital circuits. But as it possesses full controllability and negated or two bit is negated and from the state table we can observability on the circuit, which allow attackers to exploit find that swaping is also randomized , there is no certain rule this opportunity to extract key streams and even, manipulate for swaping the sequences of the shift register, so an the circuit. This makes it difficult for scan chains to be used intelligent hacker can never get any chance to hack in the especially in special cryptographic circuits where secret key scan chain. streams are stored in internal registers, thus a problem in B. RScR Added Scan Tree testing these types of circuits is imminent. However, quality of these circuits is highly in demand currently due to the Now as we know any scan chain can be represented by a tree increasing need of secure systems. Thus secure scan design shaped structure [5]. through (RScR) provides both security and testability. With the same effectiveness and efficiency of conventional scan design and with very minimal overhead, any digital circuit can be both easily testable and secure against attackers. When we consider a secure scan design, we need to assume what the attacker knows and how he can potentially make the attack. Here, we assume the following. A. ATTACKER’S KNOWLEDGE a) The attacker does not know the detailed information in the Fig9. Tree shaped scan chain gate-level design. If we replace the circled 3 state scan register of fig. 9 by RScR b) The attacker knows the cryptographic algorithm (abc3 scan register) as a result randomness and nonlinearity implemented in the circuit. So he can make bit-change both will be introduced. The modified scan tree structure insertion attack or differential values attack [1]. consists of both redundant and normal Scan D-flip-flops. c) The attacker knows the presence of test pins (scan-in/out, The new scan tree continues to provide same amount of scan, and reset) and scan chains. However, he does not know controllability and observability to the designer but not to the structure of RScR (the connection information, positions the attacker. As the structure of the RScR and the structure of of XOR and NOT, and the size) and the presence of the control the scan tree are not known to the attacker. This makes it pin .Based on the above assumptions, we define the security hard for the attacker to comprehend the structure of the tree. to prevent scan-based side-channel attacks. Further the new scan tree does not require an on-chip source The structure of the RScR is important to the attacker in order or sink. to understand the scanned out values from the registers, V. SECURITY & TESTABILITY which can reveal the key stream or the initial values of the A circuit may consist of a single or multiple scan registers internal registers, once computed. Thus, the level of security and the remaining combinational logic circuit (kernel) [9]. A is dependent on the difficulty of determining the RScR scan register is nothing but a shift register with multiplexers structure. If the attacker cannot identify the structure of the that select the normal data from the combinational logic circuit RScR, the internal register values cannot be retrieved as and the shifting data from the preceding flip-flop. Here, we output would remain the same as it would for conventional have replaced the shift register with a redundant shift register scan fig. 6 and fig. 8 shows the de Bruijn graph of two (RSR). different types of RScR (abc2, abc3). that are all functionally © 2012 ACEEE 24 DOI: 01.IJSIP.03.01. 81
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 equivalent to the 3-stage shift register but their state byte. From the number of 1’s in the XOR of the scanned out assignments are different and hence the content of each values of the register R and differential property of the AES register cannot be observed from the input/output se- algorithm, the values of register b was computed. Finally, quence in system mode while served to the customers. using value of a and the register b the key value was calculated using: RK0=B Å A. In our RScR added scan chain B. SECURITY ANALYSIS OF STREAM CIPHER WITH RSR ADDED-SCAN architecture such an attack is not viable because of the TREE : presence of the RScR and the nonlinear scan tree. The Now in case of stream cipher the structure of scan chain can security of the structure is due to the following reasons: be determined only if the user feeds in values of his choice Attacker cannot ascertain the position of register R due to and analyze the scan out data. Now with RSR added scan the unknown linear structure of the scan tree. The presence tree structure the attacker is deprived of knowing the of RSR in the scan path does not allow ascertaining the sequences of the scan chain. structure of the tree. This is because the attacker has no C. SECURITY A NALYSIS OF AES WITH RSR ADDED-SCAN TREE : control over the input to the internal structures of the design AES is an encryption standard used by the U.S. government until he knows the full structure of the RSR added scan tree. since 2001. It is now one of the most popular block cipher Since step 1 fails, step 2 cannot be performed. Also, it may be techniques due to its simple implementation in hardware. Each noted that step 2 is also not possible. This is because the AES [8] encryption includes several rounds, and each round attacker requires computing differences in the scanned out consists of four basic operations: values of register R, which is now obscured by the non- a) The Byte Sub Transformation; linear property of the RSR added-scan tree. Hence the system b) Shift Row Transformation; is secure against the known scan chain based attacks. c) Mix Column Transformation and d) Add Round Key. VI. THE ADVANTAGES OF RSCR ADDED SCAN TREE In the last operation, Add Round Key, data is exclusive- ORed Apart from providing high securities to the designs, following with a predefined encryption key. The length of the encryption are enlisted the other advantages of the RScR added scan key can be chosen as 128, 196, or 256 bits. AES algorithm is a tree. private key encryption, which means the encryption key Fast Testing: Due to the tree structure the testing is fast. (same as the decryption key) is between the transmitter and High Fault coverage: The RScR added scan chain has the the receiver only. Any leakage of the encryption key results same amount of controllability and observability as in a serious security problem. Conventional block ciphers conventional scan chain for the designer. Since the designer like AES are insecure under scan chain based attacks [1]. In don’t have to aware of the positions of the RScR in the RScR order to prevent scan based attacks on AES, we have inserted added scan tree structure as in test mode he will get the the RScR added scan tree for registers that need to be secured original sequences as an original shift register, he can easily in AES hardware. In the following we show that the RScR feed in patterns and observe the intermediate values of the added scan tree architecture provides high security with very system and thereby test the system accurately. low overhead. On-line testing is possible: There is no need of turning off the system before testing the circuit unlike in the case of secure scan architecture Testing of additional circuits or inverters is easy: Since the additional circuitry involves combinational units, testing can be easily performed. VII.THE PROBABILITY OF DETERMINING THE STRUCTURE OF THE RSR ADDED SCAN TREE The probability of guessing the correct structure of the scan tree is [5] Fig.11 Round Operation of AES encryption Now the attack on AES by [6] only can crack if it gets the following information: The first step is to guess the position The probability of guessing the correct structure of the RScR of the registers to obtain intermediate values of each step. is The main motive is to find the position of the register R in the above figure by exploiting the property of Avalanche effect in good ciphers. Once, the position of register R was as the hacker knows nothing about length of our RScR or ascertained the second step comes to play. In this step, two about the degree of RScR , then he has to try exhaustively all values of input plaintext were chosen which differs in one bit sequences of lengths 1 to K . © 2012 ACEEE 25 DOI: 01.IJSIP.03.01.81
  • 6. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Hence the total probability of guessing the correct structure REFERENCES of the RScR added scan tree is [1] Bo Yang, Kaijie Wu, and Ramesh Karri “Secure Scan: A Design- for-Test Architecture for Crypto Chips” Publication Year: 2006, Page(s): 2287 - 2293. [2] David Hély1&2, Frédéric Bancel1, Marie-Lise Flottes2, Bruno Rouzeyre 2 “Test Control for Secure Scan Designs” Publication Where Year: 2005, Page(s): 190 – 195. N: Is the number of scan output pins [3] David Hély1, Marie-Lise Flottes2, Frédéric Bancel1, Bruno L: Is the depth of the scan tree Rouzeyre2, Nicolas Bérard1, and MichelRenovell2.”Scan Design r: Is the number of nodes and Secure Chip” Publication Year: 2004, Page(s): 219 – 224. K: Is the K stage shift register [4] Debesh K. Das, Uttam K. Bhattacharya, andBhargab B. Bhattacharya,”Isomorph-Redundancy in Sequential Circuits” VIII. AREA COST & TEST POWER Publication Year: 2000 , Page(s): 992 - 997. [5] Gaurav Sengar, Debdeep Mukhopadhayay, D Roy Chowdhury To reduce the overhead due to many feed-forwards and “An Efficient Approach to Develop Secure Scan Tree for Crypto- feedbacks in a long scan chain, we can use a shift register Hardware” Publication Year: 2007, Page(s): 21 – 26. (standard scan register) for the non-secure part that is not [6] Hideo Fujiwara and Marie Engelene J. Obien “Secure and required to be scan-secure. As for the influence on test power Testable Scan Design Using Extended de Bruijn Graphs” Publication due to shift register modification, the insertion of inverters Year: 2010, Page(s): 413 – 418. [7] Jeremy Lee, Mohammed Tehranipoor, Chintan Patel, and Jim AND/OR/ XOR gates can reduce test power even more than Plusquellic “Securing Scan Design Using Lock & Key Technique” standard scan design if they are inserted appropriately as Publication Year: 2005, Page(s): 51 – 62. mentioned. [8] J. Daemen and R. Rijmen, “The Design of Rijndael: AES—The Advance Encryption Standard.” Berlin, Germany: Springer-Verlag, CONCLUSION 2002, pp. 31–62. [9] Michiko Inoue Tomokazu Yoneda Muneo Hasegawa Hideo A new secure scan design has been introduced. It involves Fujiwara “Partial Scan Approach for Secret Information Protection modification of original scan registers of scan design to “ Publication Year: 2009, Page(s): 143 – 148. redundant scan registers (RScR). One type has been analyzed [10] Somnath Paul, Rajat Subhra Chakraborty and Swarup Bhunia for scan-testability and scan-security.RScR added scan tree “VIm-Scan: A Low Overhead Scan Design Approach for Protection of a shift register can be both scan-testable and –secure by of Secret Key in Scan-Based Secure Chips” Publication Year: 2007, adding one extra control line input. A long secure scan chain Page(s): 455 – 460. can be easily constructed by cascading short scan-testable and scan-secure redundant shift registers. It also does not involve the use of additional key streams. Therefore, it provides an efficient solution to satisfy both testability and security with lesser cost. © 2012 ACEEE 26 DOI: 01.IJSIP.03.01.81