Secure JTAG Implementation Using Schnorr ProtocolReport as inadecuate




Secure JTAG Implementation Using Schnorr Protocol - Download this document for free, or read online. Document in PDF available to download.

1 KU-IBBT - FUTURE HEALTH DEPARTMENT KU Leuven KU Leuven - Katholieke Universiteit Leuven 2 ESAT-COSIC - Computer Security and Industrial Cryptography KU Leuven KU-ESAT - Department of Electrical Engineering KU Leuven 3 SysMIC - Conception et Test de Systèmes MICroélectroniques LIRMM - Laboratoire d-Informatique de Robotique et de Microélectronique de Montpellier

Abstract : The standard IEEE 1149.1 Test Access Port and Boundary-Scan Architecture, also known as JTAG port provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG port can be also exploited by attackers to mount several cryptographic attacks. In this paper we propose a novel architecture that implements a secure JTAG interface. Our JTAG scheme allows for mutual authentication between the device and the tester. In contrast to previous work, our scheme uses provably secure asymmetric-key based authentication and verification protocols. The complete scheme is implemented in hardware and integrated with the standard JTAG interface. Detailed area and timing results are also presented.

Keywords : Secure code and firmware updates Cryptographic circuits Mutual authentication Schnorr protocol Elliptic curve cryptography JTAG Secure testing IP protection





Author: Amitabh Das - Jean Da Rolt - Santosh Ghosh - Stefaan Seys - Sophie Dupuis - Giorgio Di Natale - Marie-Lise Flottes - Bruno Rouzey

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents