›› 2014,Vol. 29 ›› Issue (4): 646-655.doi: 10.1007/s11390-014-1456-3

所属专题: Computer Architecture and Systems

• Special Section on Selected Paper from NPC 2011 • 上一篇    下一篇

针对流加密法的扫描链攻击:一个对eSTREAM 的案例研究

Min-Hui Zou1 (邹敏辉), Kun Ma2 (马坤), Kai-Jie Wu1,3,* (吴剀劼), Member, IEEE, and Edwin Hsing-Mean Sha1 (沙行勉), Senior Member, IEEE   

  1. 1. College of Computer Science, Chongqing University, Chongqing 400044, China;
    2. Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL 60607, U.S.A.;
    3. Key Laboratory of Dependable Service Computing in Cyber Physical Society, Chongqing University, Ministry of Education Chongqing 400044, China
  • 出版日期:2014-07-05 发布日期:2014-07-05
  • 作者简介:Min-Hui Zou received the B.S. degree in computer science and technology from Chongqing University, China, in 2013. Currently he is a Ph.D. student majoring in computer science and technology of the College of Computer Science, Chongqing University. His current research interests include security of cryptographic system and side-channel attacks.
  • 基金资助:

    This work is partially supported by the National High Technology Research and Development 863 Program of China under Grant No. 2013AA013202, the Key Programs for Science and Technology Development of Chongqing of China under Grant No. cstc2012ggC40005, the National Natural Science Foundation of China under Grant No. 61173014, and the National Science Foundation of USA under Grant No. CNS-1015802.

Scan-Based Attack on Stream Ciphers:A Case Study on eSTREAM Finalists

Min-Hui Zou1 (邹敏辉), Kun Ma2 (马坤), Kai-Jie Wu1,3,* (吴剀劼), Member, IEEE, and Edwin Hsing-Mean Sha1 (沙行勉), Senior Member, IEEE   

  1. 1. College of Computer Science, Chongqing University, Chongqing 400044, China;
    2. Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, IL 60607, U.S.A.;
    3. Key Laboratory of Dependable Service Computing in Cyber Physical Society, Chongqing University, Ministry of Education Chongqing 400044, China
  • Online:2014-07-05 Published:2014-07-05
  • About author:Min-Hui Zou received the B.S. degree in computer science and technology from Chongqing University, China, in 2013. Currently he is a Ph.D. student majoring in computer science and technology of the College of Computer Science, Chongqing University. His current research interests include security of cryptographic system and side-channel attacks.
  • Supported by:

    This work is partially supported by the National High Technology Research and Development 863 Program of China under Grant No. 2013AA013202, the Key Programs for Science and Technology Development of Chongqing of China under Grant No. cstc2012ggC40005, the National Natural Science Foundation of China under Grant No. 61173014, and the National Science Foundation of USA under Grant No. CNS-1015802.

尽管基于扫描链的测试技术改善了测试的效率,但是它同时也给存储在芯片内的隐私信息留下了一条旁道通路。本篇文章出了一个然简单但是非常强大的利用扫描链的旁道攻击技术。这个攻击技术只需要最多 85 个扫描序列,却可以挖掘出存储在实现流加密 法芯片上的密钥。

Abstract: While Scan-based DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the chip. This paper investigates the side channel and proposes a simple yet powerful scan-based attack that can reveal the key and/or state stored in the chips that implement the state-of-the-art stream ciphers with less than 85 scan-out vectors.

[1] Hély D, Flottes M L, Bancel F et al. Scan design and secure chip. In Proc. the 10th IEEE International On-Line Testing Symposium, Jul. 2004, pp.219-226.

[2] Josephson D D, Poehhnan S, Govan V. Debug methodology for the McKinley processor. InProc. the International Test Conference, Nov. 2001, pp.451-460.

[3] Skorobogatov S P, Anderson R J. Optical fault induction attacks. In Lecture Notes in Computer Science 2523, Kaliski B S, Koç C K, Paar C (eds.), Springer-Verlag Berlin Heidelberg, 2002, pp.2-12.

[4] Yang B, Wu K, Karri R. Secure scan: A design-for-test architecture for crypto chips. IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(10): 22872293.

[5] Kamal A A, Youssef A M. A scan-based side channel attack on the NTRUEncrypt cryptosystem. In Proc. the 7th International Conference on Availability, Reliability and Security, Aug. 2012, pp.402-409.

[6] Salehani Y E. Side channel attacks on symmetric key primitives [Master Thesis]. Concordia University, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani MASc F2011.pdf, May 2014.

[7] Preneel B. A survey of recent developments in cryptographic algorithms for smart cards. Computer Networks, 2007, 51(9): 2223-2233.

[8] Canteaut A. Open problems related to algebraic attacks on stream ciphers. In Lecture Notes in Computer Science 3969, Ytrehus ø(ed.), Springer Berlin Heidelberg, pp.120-134.

[9] Hell M, Johansson T, Meier W. Grain: A stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2007, 2(1): 86-93.

[10] Liu Y, Wu K, Karri R. Scan-based attacks on linear feedback shift register based stream ciphers. ACM Trans. Design Automation of Electronic Systems, 2011, 16(2), Article No.20.

[11] Mukhopadhyay D, Banerjee S, Roychowdhury D et al. CryptoScan: A secured scan chain architecture. In Proc. the 14th Asian Test Sysmposium, Dec. 2005, pp.348-353.

[12] Lee J, Tehranipoor M, Patel C et al. Securing scan design using lock and key technique. In Proc. the 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, Oct. 2005, pp.51-62.

[13] Lee J, Tehranipoor M, Plusquellic J. A low-cost solution for protecting IPs against scan-based side-channel attacks. In Proc. the 24th IEEE VLSI Test Symposium, April 30-May 4, 2006, pp.94-99.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 刘明业; 洪恩宇;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[2] 陈世华;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[3] 高庆狮; 张祥; 杨树范; 陈树清;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[4] 陈肇雄; 高庆狮;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[5] 黄河燕;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[6] 闵应骅; 韩智德;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[7] 唐同诰; 招兆铿;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[8] 闵应骅;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[9] 朱鸿;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
[10] 李明慧;. CAD System of Microprogrammed Digital Systems[J]. , 1987, 2(3): 226 -235 .
版权所有 © 《计算机科学技术学报》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn
总访问量: