Secure JTAG Implementation Using Schnorr Protocol

被引:22
|
作者
Das, Amitabh [1 ,5 ]
Da Rolt, Jean [6 ]
Ghosh, Santosh [2 ,5 ]
Seys, Stefaan [3 ,5 ]
Dupuis, Sophie [6 ]
Di Natale, Giorgio [6 ]
Flottes, Marie-Lise [6 ]
Rouzeyre, Bruno [6 ]
Verbauwhede, Ingrid [4 ,5 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, Louvain, Belgium
[2] Katholieke Univ Leuven, ESAT COSIC, Louvain, Belgium
[3] Katholieke Univ Leuven, COSIC Comp Secur & Ind Cryptog, Dept Elect Engn ESAT, Louvain, Belgium
[4] Katholieke Univ Leuven, Comp Secur & Ind Cryptog COSIC Lab, Louvain, Belgium
[5] ESAT COSIC, iMinds, Louvain, Belgium
[6] Univ Montpellier 2, LIRMM, CNRS UMR 5506, Montpellier, France
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2013年 / 29卷 / 02期
关键词
JTAG; Secure testing; IP protection; Secure code and firmware updates; Cryptographic circuits; Schnorr protocol; Elliptic curve cryptography; Mutual authentication; PROCESSOR;
D O I
10.1007/s10836-013-5369-9
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG port can be also exploited by attackers to mount several cryptographic attacks. In this paper we propose a novel architecture that implements a secure JTAG interface. Our JTAG scheme allows for mutual authentication between the device and the tester. In contrast to previous work, our scheme uses provably secure asymmetric-key based authentication and verification protocols. The complete scheme is implemented in hardware and integrated with the standard JTAG interface. Detailed area and timing results are also presented.
引用
收藏
页码:193 / 209
页数:17
相关论文
共 50 条
  • [21] Testbed implementation of a secure flooding time synchronization protocol
    Roosta, Tanya
    Liao, Wei-Chieh
    Teng, Wei-Chung
    Sastry, Shankar
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 3157 - +
  • [22] Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol
    Takahashi, Akihiro
    Maeda, Tomotaka
    Okabe, Yasuo
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 19 - 28
  • [23] A new electronic voting protocol based on the Schnorr blind signature protocol
    Zhan, L
    Peng, L
    PROCEEDINGS OF THE WORLD ENGINEERS' CONVENTION 2004, VOL A, NETWORK ENGINEERING AND INFORMATION SOCIETY, 2004, : 358 - 363
  • [24] USING KERBEROS TO SECURE TLS PROTOCOL
    Raluca, Catargiu
    Monica, Borda
    2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 237 - 240
  • [25] The Research and Implementation of E-commerce secure payment protocol
    Ding, Xiajun
    Jiang, Xiaodan
    Zheng, YueZhai
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 74 - 79
  • [26] SEAS, a secure e-voting protocol: Design and implementation
    Baiardi, F
    Falleni, A
    Granchi, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    COMPUTERS & SECURITY, 2005, 24 (08) : 642 - 652
  • [27] THE IMPLEMENTATION OF A PROTOCOL USING AUTOMATA
    MULDER, PG
    VONSOLMS, SH
    INFORMATION SCIENCES, 1992, 59 (1-2) : 53 - 89
  • [28] Robust secure communication protocol for smart healthcare system with FPGA implementation
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Vijaykumar, V. R.
    Sekar, S. Raja
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 938 - 951
  • [29] Implementation of a provably secure, smartcard-based key distribution protocol
    Jerdonek, R
    Honeyman, P
    Coffman, K
    Rees, J
    Wheeler, K
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 229 - 235
  • [30] Design and Implementation of Inter-operable and Secure Agent Migration Protocol
    Shah, Shakir-Ullah
    Ahmad, Jamil
    Najeeb-ur-Rehman
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (04) : 461 - 470