Secure JTAG Implementation Using Schnorr Protocol

被引:22
|
作者
Das, Amitabh [1 ,5 ]
Da Rolt, Jean [6 ]
Ghosh, Santosh [2 ,5 ]
Seys, Stefaan [3 ,5 ]
Dupuis, Sophie [6 ]
Di Natale, Giorgio [6 ]
Flottes, Marie-Lise [6 ]
Rouzeyre, Bruno [6 ]
Verbauwhede, Ingrid [4 ,5 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, Louvain, Belgium
[2] Katholieke Univ Leuven, ESAT COSIC, Louvain, Belgium
[3] Katholieke Univ Leuven, COSIC Comp Secur & Ind Cryptog, Dept Elect Engn ESAT, Louvain, Belgium
[4] Katholieke Univ Leuven, Comp Secur & Ind Cryptog COSIC Lab, Louvain, Belgium
[5] ESAT COSIC, iMinds, Louvain, Belgium
[6] Univ Montpellier 2, LIRMM, CNRS UMR 5506, Montpellier, France
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2013年 / 29卷 / 02期
关键词
JTAG; Secure testing; IP protection; Secure code and firmware updates; Cryptographic circuits; Schnorr protocol; Elliptic curve cryptography; Mutual authentication; PROCESSOR;
D O I
10.1007/s10836-013-5369-9
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG port can be also exploited by attackers to mount several cryptographic attacks. In this paper we propose a novel architecture that implements a secure JTAG interface. Our JTAG scheme allows for mutual authentication between the device and the tester. In contrast to previous work, our scheme uses provably secure asymmetric-key based authentication and verification protocols. The complete scheme is implemented in hardware and integrated with the standard JTAG interface. Detailed area and timing results are also presented.
引用
收藏
页码:193 / 209
页数:17
相关论文
共 50 条
  • [41] On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 55 - 70
  • [42] Implementation of Energy Aware Secure Routing Protocol over Flooding Environment in MANET
    Sawant, Khushboo
    Rawat, Manoj Kumar
    Jain, Aakansha
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [43] SocialSDN: Design and Implementation of a Secure Internet Protocol Tunnel Between Social Connections
    Lescisin, Michael
    Mahmoud, Qusay H.
    2021 15TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2021), 2021,
  • [44] Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services
    Magdalena Payeras-Capella, M.
    Mut-Puigserver, Macia
    Conejero-Alberola, Pau
    Castella-Roca, Jordi
    Huguet-Rotger, Llorenc
    COMPUTER JOURNAL, 2020, 63 (08): : 1168 - 1193
  • [45] Speedy and Secure Remote Management Protocol Using Virtualization
    Sudharson, K.
    Balaji, S.
    Reddy, A. Deepak
    Ram, V. Sai
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3, 2023, 492 : 435 - 442
  • [46] MQTree: Secure OTA Protocol Using MQTT and MerkleTree
    Shin, Yunje
    Jeon, Sanghoon
    SENSORS, 2024, 24 (05)
  • [47] Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (06) : 1035 - 1045
  • [48] Secure payment protocol for healthcare using USIM in ubiquitous
    Back, JM
    Hong, IS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 964 - 972
  • [49] Improving the secure electronic transaction protocol by using signcryption
    Hanaoka, G
    Zheng, YL
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (08) : 2042 - 2051
  • [50] Constructing secure routing protocol using trust model
    Yu, Wang-Ke
    Ma, Wen-Ping
    Yan, Ya-Jun
    Yang, Yuan-Yuan
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (03): : 48 - 51