Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures

  • Authors:
  • Mukesh Agrawal;Sandip Karmakar;Dhiman Saha;Debdeep Mukhopadhyay

  • Affiliations:
  • B.Tech. Student, Dept. of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India;MS Student, Dept. of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India;MS Student, Dept. of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India;Assistant Professor Dept. of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India

  • Venue:
  • INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Scan chain based attacks are a kind of side channel attack, which targets one of the most important feature of today's hardware - the test circuitry. Design for Testability (DFT) is a design technique that adds certain testability features to a hardware design. On the other hand, this very feature opens up a side channel for cryptanalysis, rendering crypto-devices vulnerable to scan-based attack. Our work studies scan attack as a general threat to stream ciphers and arrives at a general relation between the design of stream ciphers and their vulnerability to scan attack. Finally, we propose a scheme which we show to thwart the attacks and is more secure than other contemporary strategies.