Scan-based attacks on linear feedback shift register based stream ciphers

  • Authors:
  • Yu Liu;Kaijie Wu;Ramesh Karri

  • Affiliations:
  • University of Illinois at Chicago, IL;University of Illinois at Chicago, IL;Polytechnic Institute of New York University, Brooklyn, NY

  • Venue:
  • ACM Transactions on Design Automation of Electronic Systems (TODAES)
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Stream cipher is an important class of encryption algorithm that encrypts plaintext messages one bit at a time. Various stream ciphers are deployed in wireless telecommunication applications because they have simple hardware circuitry, are generally fast and consume very low power. On the other hand, scan-based Design-for-Test (DFT) is one of the most popular methods to test IC devices. All flip-flops in the Design Under Test are connected to one or more scan chains and the states of the flip-flops can be scanned out through these chains. In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the Linear Feedback Shift Registers in their implementations. Although scan-based DFT is a powerful testing scheme, we show that it can be used to retrieve the information stored in a crypto chip thus compromising its theoretically proven security.