Secure JTAG Implementation Using Schnorr Protocol

被引:22
|
作者
Das, Amitabh [1 ,5 ]
Da Rolt, Jean [6 ]
Ghosh, Santosh [2 ,5 ]
Seys, Stefaan [3 ,5 ]
Dupuis, Sophie [6 ]
Di Natale, Giorgio [6 ]
Flottes, Marie-Lise [6 ]
Rouzeyre, Bruno [6 ]
Verbauwhede, Ingrid [4 ,5 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, Louvain, Belgium
[2] Katholieke Univ Leuven, ESAT COSIC, Louvain, Belgium
[3] Katholieke Univ Leuven, COSIC Comp Secur & Ind Cryptog, Dept Elect Engn ESAT, Louvain, Belgium
[4] Katholieke Univ Leuven, Comp Secur & Ind Cryptog COSIC Lab, Louvain, Belgium
[5] ESAT COSIC, iMinds, Louvain, Belgium
[6] Univ Montpellier 2, LIRMM, CNRS UMR 5506, Montpellier, France
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2013年 / 29卷 / 02期
关键词
JTAG; Secure testing; IP protection; Secure code and firmware updates; Cryptographic circuits; Schnorr protocol; Elliptic curve cryptography; Mutual authentication; PROCESSOR;
D O I
10.1007/s10836-013-5369-9
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG port can be also exploited by attackers to mount several cryptographic attacks. In this paper we propose a novel architecture that implements a secure JTAG interface. Our JTAG scheme allows for mutual authentication between the device and the tester. In contrast to previous work, our scheme uses provably secure asymmetric-key based authentication and verification protocols. The complete scheme is implemented in hardware and integrated with the standard JTAG interface. Detailed area and timing results are also presented.
引用
收藏
页码:193 / 209
页数:17
相关论文
共 50 条
  • [31] Demo: A Proof-of-Concept Implementation of Guard Secure Routing Protocol
    Taheri-Boshrooyeh, Sanaz
    Sahin, Ali Utkan
    Hassanzadeh-Nazarabadi, Yahya
    Ozkasap, Oznur
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 332 - 334
  • [32] Design and implementation of a secure group communication protocol on a fault tolerant ring
    Saglam, Ö
    Dalkiliç, ME
    Erciyes, K
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 802 - 810
  • [33] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1512 - 1524
  • [34] A secure electronic examination protocol using wireless
    Herrera-Joancomartí, J
    Prieto-Blázquez, J
    Castellà-Roca, J
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 263 - 267
  • [35] Secure Routing Protocol in MANET Using TAC
    Pandit, Charusheela M.
    Ladhe, Seema A.
    2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 107 - 112
  • [36] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 : 135 - 152
  • [37] An improved design of JTAG controller and its logic implementation
    Jiang, X.
    Shen, X.
    Zhang, T.
    Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 2001, 29 (01): : 63 - 65
  • [38] ON THE SECURITY OF THE SCHNORR SCHEME USING PREPROCESSING
    DEROOIJ, P
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 71 - 80
  • [39] HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures
    Bacho, Renas
    Loss, Julian
    Stern, Gilad
    Wagner, Benedikt
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT III, 2025, 15486 : 104 - 140
  • [40] A new forward-secure threshold signature scheme based on Schnorr cryptosystem
    Cheng, Guosheng
    Yun, Cuilan
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 599 - +