• 検索結果がありません。

11 WRTLT pptx 最近の更新履歴 Hideo Fujiwara

N/A
N/A
Protected

Academic year: 2018

シェア "11 WRTLT pptx 最近の更新履歴 Hideo Fujiwara"

Copied!
34
0
0

読み込み中.... (全文を見る)

全文

(1)

WAGSR:

Web Application for

Generalized Feed Forward Shift Registers

Katsuya Fujiwara* and Hideo Fujiwara**

* Akita University

** Osaka Gakuin University

(2)

2

Background and Motivation

2

Quality 

 

 

 

 

scan

reset Scan-in

Combinational Logic Circuit   (Kernel)

x

Testability: Good Scan design makes testing easier

Scan Design

Security: Bad Scan chains can be used to steal important information such as secret keys of

cryptographic chips.

There exists an inherent contradiction between testability and security. There is a need for an efficient solution that satisfies both testability and security.

(3)

3

Our Previous Works

  Proposed a secure scan design approach

(ASP-DAC 2010, 2011, WRTLT 2010, 2011)

◦  Satisfies both testability and security

◦  Replaces original scan chains with modified scan chains using SR-equivalent circuits, e.g. inversion-inserted linear-feed-

forward shift registers (I2LF2SR)

Which leads to:

◦  Little area overhead

◦  No performance overhead

◦  No need to change traditional ATPG algorithm

y1 y2 y3

x z

I2LF2SR

(4)

4

In This Work

  Introduce a new class of extended SR called generalized feed- forward SR (GF2SR) which is an extension of I2LF2SR.

◦  Still satisfy both testability and security

◦  Much wider than I2LF2SR

Which leads to:

◦  Higher cardinality than I2LF2SR

◦  More secure than I2LF2SR y

1 y2 y3

x z

I2LF2SR

y1 y2 y3

x z

GF2SR

(5)

5

Replacement of scan chain by modified scan chain

Scan Chain Secret Register

Secret Register

Standard Scan Chain

Standard Scan Chain Modified Scan

Chain

Our Secure Scan Design

(6)

6

Generalized Feed Forward Shift Registers (GF

2

SR)

y1 y2 y3

x z

y1 y2 y3

x z

y1 y2 y3

x z

(7)

7

Generalized Feed Forward Shift Registers (GF

2

SR)

y1 y2 y3

x z

y1 y2 y3

x z

y1 y2 y3

x z

Our objective is to show that GF

2

SR satisfies both

testability and security .

Let us first consider the testability.

(8)

! !! !! !! !

!(!) !

!(!) !!(!) !!(!)

!(! + 1)

!(! + 2)

!(! + 3)

8

How to Control/Observe (by Symbolic Simulation)

y1 y2 y3

x z

Input sequence

Initial state

(9)

! !! !! !! !

!(!) !

!(!) !!(!) !!(!) !!(!)

!(! + 1) !(!) !

!(!) !!(!) ⊕ ! ! ⋅ !!(!) !!(!) ⊕ ! ! ⋅ !!(!)

!(! + 2) !(! + 1) !(!) !

!(!) ⊕ ! ! + 1 ⋅ ! ! !!(!) ⊕ ! ! + 1 ⋅ ! !

!(! + 3) ! ! +2 !(! + 1) ! ! ⊕ ! ! + 2 ⋅ ! ! + 1 ! ! ⊕ ! ! + 2 ⋅ ! ! + 1

9

How to Control/Observe (by Symbolic Simulation)

y1 y2 y3

x z

Final state

Output sequence

(10)

10

How to Control/Observe (by Symbolic Simulation)

y1 y2 y3

x z

! !! !! !! !

!(!) !

!(!) !!(!) !!(!) !(!) = !!(!)

!(! + 1) !(!) !

!(!) !!(!) ⊕ ! ! ⋅ !!(!) !(! + 1) = !!(!) ⊕ ! ! ⋅ !!(!)

!(! + 2) !(! + 1) !(!) !

!(!) ⊕ ! ! + 1 ⋅ ! ! !(! + 2) = !!(!) ⊕ ! ! + 1 ⋅ ! !

!(! + 3) ! ! +2

= !!(! + 3)

!(! + 1)

= !!(! + 3)

! ! ⊕ ! ! + 2 ⋅ ! ! + 1

= !!(! + 3)

! ! + 3 = ! ! ⊕ ! ! + 2 ⋅ ! ! + 1

!(!) = !!(! + 3) ⊕ !!(! + 3) ⋅ !!(! + 3)

!(! + 1) = !!(! + 3)

!(! + 2) = !!(! + 3)

!!(!) = !(! + 2) ⊕ !(! + 1) ⋅ !(!)

!!(!) = !(! + 1) ⊕ !(!) ⋅ !!(!)

= !(! + 1) ⊕ !(!) ⋅ !(! + 2) ⊕ !(! + 1) ⋅ !(!)

!!(!) = !(!)

State justification

(Scan in) State identification

(Scan out)

The transfer sequence is expressed by the final state only, independently of the initial state.

Hence, state-justification is easy, i.e., easy to scan-in.

(11)

11

How to Control/Observe (by Symbolic Simulation)

y1 y2 y3

x z

! !! !! !! !

!(!) !

!(!) !!(!) !!(!) !(!) = !!(!)

!(! + 1) !(!) !

!(!) !!(!) ⊕ ! ! ⋅ !!(!) !(! + 1) = !!(!) ⊕ ! ! ⋅ !!(!)

!(! + 2) !(! + 1) !(!) !

!(!) ⊕ ! ! + 1 ⋅ ! ! !(! + 2) = !!(!) ⊕ ! ! + 1 ⋅ ! !

!(! + 3) ! ! +2

= !!(! + 3)

!(! + 1)

= !!(! + 3)

! ! ⊕ ! ! + 2 ⋅ ! ! + 1

= !!(! + 3)

! ! + 3 = ! ! ⊕ ! ! + 2 ⋅ ! ! + 1

!(!) = !!(! + 3) ⊕ !!(! + 3) ⋅ !!(! + 3)

!(! + 1) = !!(! + 3)

!(! + 2) = !!(! + 3)

!!(!) = !(! + 2) ⊕ !(! + 1) ⋅ !(!)

!!(!) = !(! + 1) ⊕ !(!) ⋅ !!(!)

= !(! + 1) ⊕ !(!) ⋅ !(! + 2) ⊕ !(! + 1) ⋅ !(!)

!!(!) = !(!)

State justification

(Scan in) State identification

(Scan out)

Any initial state can be identified from the input-output sequence and the circuit information, where the input sequence is arbitrary.

Hence, state-identification is easy.

(12)

12

How to Control/Observe (by Symbolic Simulation)

y1 y2 y3

x z

! !! !! !! !

!(!) !

!(!) !!(!) !!(!) !(!) = !!(!)

!(! + 1) !(!) !

!(!) !!(!) ⊕ ! ! ⋅ !!(!) !(! + 1) = !!(!) ⊕ ! ! ⋅ !!(!)

!(! + 2) !(! + 1) !(!) !

!(!) ⊕ ! ! + 1 ⋅ ! ! !(! + 2) = !!(!) ⊕ ! ! + 1 ⋅ ! !

!(! + 3) ! ! +2

= !!(! + 3)

!(! + 1)

= !!(! + 3)

! ! ⊕ ! ! + 2 ⋅ ! ! + 1

= !!(! + 3)

! ! + 3 = ! ! ⊕ ! ! + 2 ⋅ ! ! + 1

!(!) = !!(! + 3) ⊕ !!(! + 3) ⋅ !!(! + 3)

!(! + 1) = !!(! + 3)

!(! + 2) = !!(! + 3)

!!(!) = !(! + 2) ⊕ !(! + 1) ⋅ !(!)

!!(!) = !(! + 1) ⊕ !(!) ⋅ !!(!)

= !(! + 1) ⊕ !(!) ⋅ !(! + 2) ⊕ !(! + 1) ⋅ !(!)

!!(!) = !(!)

State justification

(Scan in) State identification

(Scan out)

However, it is hard to derive those equations and to solve the solutions if the circuit size becomes large.

As an alternative method, logic simulation can be considered instead of symbolic simulation.

(13)

!"#$ ! !

! !! !! !

! !" ⊕ !

! + 1 ! !" ⊕ !

! + 2 ! ! !" ⊕ !

! + 3 ! ! !

13

How to Control ESR (by Implication Operation)

y1 y2 y3

x z

How to derive transfer sequence for final state Final state

(14)

!"#$ ! !

! !! !! !

! !" ⊕ !

! + 1 ! !" ⊕ !

! + 2 ! ! !" ⊕ !

! + 3 ! ! !

14

How to Control ESR (by Implication Operation)

y1 y2 y3

x z

How to derive transfer sequence for final state

(15)

!"#$ ! !

! !! !! !

! !" ⊕ !

! + 1 ! !" ⊕ !

! + 2 ! ! !" ⊕ !

! + 3 ! ! !

15

How to Control ESR (by Implication Operation)

y1 y2 y3

x z

How to derive transfer sequence for final state

(16)

!"#$ ! !

! !! !! !

! !" ⊕ !

! + 1 ! !" ⊕ !

! + 2 ! ! !" ⊕ !

! + 3 ! ! !

16

How to Control ESR (by Implication Operation)

y1 y2 y3

x z

How to derive transfer sequence for final state

(17)

!"#$ ! !

! !! !! !

! !" ⊕ !

! + 1 ! !" ⊕ !

! + 2 ! ! !" ⊕ !

! + 3 ! ! !

17

How to Control ESR (by Implication Operation)

y1 y2 y3

x z

The transfer sequence can be uniquely obtained very fast and easily only by logic simulation of implication

(18)

18

How to Control ESR

y1 y2 y3

x z x y1 y2 y3 z

x y1 y2 y3 z

1 1 0

x y1 y2 y3 z

1 1 0

(19)

19

How to Control ESR (After Implication)

y1 y2 y3

x z x y1 y2 y3 z

x y1 y2 y3 z

1 1 1

1

1 1

1 1 0

x y1 y2 y3 z

0 1 1

0

1 0

1 1 0

Since the attacker does not know the structure of ESR,

he/she cannot find out the transfer sequence for final state (1, 1, 0).

(20)

!"#$ ! !

! !! !! !

! ! !" ⊕ ! !(!" ⊕ !) ⊕ ! ! !

! + 1 ! ! !" ⊕ ! ! !

! + 2 ! ! ! ! !

20

How to Observe ESR (by Implication Operation)

y1 y2 y3

x z

How to identify the initial state from input/output sequence

(21)

!"#$ ! !

! !! !! !

! ! !" ⊕ ! !(!" ⊕ !) ⊕ ! ! !

! + 1 ! ! !" ⊕ ! ! !

! + 2 ! ! ! ! !

21

How to Observe ESR (by Implication Operation)

y1 y2 y3

x z

How to identify the initial state from input/output sequence

(22)

!"#$ ! !

! !! !! !

! ! !" ⊕ ! !(!" ⊕ !) ⊕ ! ! !

! + 1 ! ! !" ⊕ ! ! !

! + 2 ! ! ! ! !

22

How to Observe ESR (by Implication Operation)

y1 y2 y3

x z

How to identify the initial state from input/output sequence

(23)

!"#$ ! !

! !! !! !

! ! !" ⊕ ! !(!" ⊕ !) ⊕ ! ! !

! + 1 ! ! !" ⊕ ! ! !

! + 2 ! ! ! ! !

23

How to Observe ESR (by Implication Operation)

y1 y2 y3

x z

How to identify the initial state from input/output sequence

(24)

!"#$ ! !

! !! !! !

! ! !" ⊕ ! !(!" ⊕ !) ⊕ ! ! !

! + 1 ! ! !" ⊕ ! ! !

! + 2 ! ! ! ! !

24

How to Observe ESR (by Implication Operation)

y1 y2 y3

x z

The initial state can be uniquely identified only from input- output sequence by logic simulation of implication

(25)

25

How to Observe ESR

y1 y2 y3

x z x y1 y2 y3 z

x y1 y2 y3 z

1 1 0

0 1 1

x y1 y2 y3 z

1 1 0

0 1 1

(26)

26

How to Observe ESR (After Implication)

y1 y2 y3

x z x y1 y2 y3 z

x y1 y2 y3 z

1 1 0

0 1 0 1 0 1

1 1 1

0 1 1

x y1 y2 y3 z

1 1 0

1 1 0 1 1 1

1 1 1

0 1 1

Since the attacker does not know the structure of ESR, he/she cannot identify the initial state as (0, 1, 0).

(27)

27

Security Level of Proposed Scan Design

The security level of the secure scan architecture is determined by the probability that an attacker can guess right the structure of the GF2SR circuit.

Hence the attack probability approximates to the reciprocal of the cardinality of the class of GF2SRs.

(28)

28

Cardinality of Each Class of Extended SRs

(2

k(k+1)/2

-1)(2

k+1

-1)

The complexity of identifying the structure of GF2SR is proportional to the cardinality of the class of GF2SR.

So, it is very hard and intractable to identify the structure of a given extended SR from the information on input/output relation only.

GF

2

SR

I2SR LF2SR

I

2

LF

2

SR

(2 - 1) 2

k+1

(29)

29

WAGSR (Web Application for GF

2

SR)

Design of GF2SR by means of logic expression

As a tool to assist design and analysis of GF2SR, we implemented a web application program called WAGSR.

(30)

30

WAGSR (Web Application for GF

2

SR)

Symbolic simulation

(31)

31

WAGSR (Web Application for GF

2

SR)

State-justification by implication

(32)

32

WAGSR (Web Application for GF

2

SR)

State-identification by implication

(33)

33

Conclusion

  Introduced a new class of extended SR called generalized feed-forward SR (GF2SR) which is an extension of I2LF2SR.

◦ Still satisfy both testability and security

◦ Much wider than I2LF2SR Which leads to:

◦ Higher cardinality than I2LF2SR

◦ More secure than I2LF2SR

  A web application called WAGSR was introduced to assist design and analysis of GF2SR

  The proposed approach:

◦ Little area overhead

◦ No performance overhead

◦ No need to change traditional ATPG algorithm

(34)

34

Thank you

参照

関連したドキュメント

[r]

In this section we provide, as consequence of Theorem 1, a method to construct all those Kleinian groups containing a Schottky group as a normal subgroup of finite order (called in

We show that a discrete fixed point theorem of Eilenberg is equivalent to the restriction of the contraction principle to the class of non-Archimedean bounded metric spaces.. We

東京都は他の道府県とは値が離れているように見える。相関係数はこう

We show that the Chern{Connes character induces a natural transformation from the six term exact sequence in (lower) algebraic K { Theory to the periodic cyclic homology exact

In this paper, we extend this method to the homogenization in domains with holes, introducing the unfolding operator for functions defined on periodically perforated do- mains as

In Section 3 using the method of level sets, we show integral inequalities comparing some weighted Sobolev norm of a function with a corresponding norm of its symmetric

The first group contains the so-called phase times, firstly mentioned in 82, 83 and applied to tunnelling in 84, 85, the times of the motion of wave packet spatial centroids,