Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/10607
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Popat, Jayesh | - |
dc.date.accessioned | 2022-02-08T10:29:15Z | - |
dc.date.available | 2022-02-08T10:29:15Z | - |
dc.date.issued | 2020-06 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/10607 | - |
dc.description.abstract | In the era of Information and Communication Technology, the user information or data may take electronic form. The security of such user information from malicious intentions is a prime concern nowadays. Cryptography is used for securing the data by using algorithms in such a way that only authorized parties can access it. Cryptography goals can easily be achieved by the most widely used encryption algorithm Advanced Encryption Standard (AES). AES is a mathematically unbreakable algorithm. However, AES hardware implementation is vulnerable to attacks and secret data stored can be leaked. Therefore, Hardware Security and Trust of such cryptohardware are critically important. Hardware Security normally deals with securing the private data stored in the crypto-hardware. Hardware Trust generally aims at the design and fabrication of hardware. Hardware Trust can be violated by inserting Hardware Trojans during the design or manufacturing steps of the IC life cycle. By definition, Hardware Trojan is any addition or modification to a circuit or a system with “malicious intention”. The thesis investigates different types of hardware trojans and their state-of-the-art detection schemes in detail. Further, the novel transition probabilistic technique for Hardware Trojan detection is proposed. Experimental results demonstrate the effectiveness of the proposed scheme on various ISCAS’85 benchmark circuits. Hardware Security can be violated by attacking the AES hardware and recovering the secret key. When implemented in hardware, the most widely used scan-chains and other test infrastructure are incorporated with AES for detecting manufacturing defects after fabrication. As found generally, these scan-chains and test compression hardware are being exploited by the attacker to retrieve the secret encryption key of AES cipher. The most commonly cited test infrastructure-based attacks are the Differential Scan Attack (DSA) and Test Mode Only (TMO) attack. In this work, the basics of the AES algorithm and its state-of-the-art attacks as well as countermeasures are surveyed, studied and analyzed. As a proof of concept, it is demonstrated that with DSA as well as TMO, the secret key is recovered in case of normal AES and AES with Response Compactors (X-Tolerant and Multiple Input Signature Register). State-of-art countermeasures have area and test time limitations. Some of them are only capable of preventing DSA and others are capable of only TMO attacks. There is a high need for unified countermeasure which can thwart both attacks and should have less overheads as well as be easily integrated into the current SoC integration flow. The proposed countermeasure, Modular Exponentiation Secure Scheme (ME-SS) is based on a one-way function. The software and hardware implementation of the proposed countermeasure is included in detail. Experimental results and statistical analysis show that the proposed countermeasure is improving the security in the case of DSA as well as TMO as compared to the recently published countermeasure. It is further shown that the time and area overheads are comparatively less. To further improve the security, the novel Hash function based Secure Scheme (HSS) is proposed. This scheme is improving the security against DSA and TMO attacks compared to the recently published countermeasure as well as the proposed ME-SS countermeasure at the cost of a marginal increase in area and test time compared to previously proposed ME-SS. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | TT000101; | - |
dc.subject | Theses | en_US |
dc.subject | EC Theses | en_US |
dc.subject | Theses EC | en_US |
dc.subject | Dr. Usha Mehta | en_US |
dc.subject | 13EXTPHDE108 | en_US |
dc.subject | TT000101 | en_US |
dc.subject | Theses IT | en_US |
dc.subject | ITFEC010 | en_US |
dc.title | Countermeasures against Test Infrastructure based attacks on AES Circuits and Trojans | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Ph.D. Research Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TT000101.pdf | TT000101 | 8.12 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.