DYNAMIC SECRET KEY SECURITY SYSTEM FOR TEST CIRCUIT AND METHOD OF THE SAME
20210083868 ยท 2021-03-18
Inventors
Cpc classification
H04L9/0861
ELECTRICITY
H04L9/003
ELECTRICITY
H04L2209/26
ELECTRICITY
H04L9/088
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
Abstract
A dynamic secret key security system for test circuit and a method of the same are disclosed. The security architecture includes a scan chain set, a dynamic key generator, a secret key checking logic, a fake response generator, and a controller. Scan chains of the scan chain set receive a test vector while the dynamic key generator produces different secret keys according to the test vector received. The secret key checking logic is used for comparing the test vector with the secret key so as to know whether they are the same. Thus whether the test vector being input is legal can be learned. Thereby the present dynamic secret key generation technique provides higher security level. Moreover, the secret key will not be stored in the memory in advance so that attackers cannot get the secret key through attacks on the memory.
Claims
1. A dynamic secret key security system for test circuit comprising: a scan chain set having a plurality of scan chains each of which includes a scan output disposed on one end thereof and a scan input that is arranged at the other end thereof and used for receiving a test vector as inputs; a dynamic key generator electrically connected to the scan chain set and used for receiving the test vector from the scan input; a secret key checking logic electrically connected to the dynamic key generator and the scan chain set; a fake response generator electrically connected to the dynamic key generator and the secret key checking logic; and a controller electrically connected to the dynamic key generator, the secret key checking logic and the fake response generator, wherein the fake response generator electrically connected to the secret key checking logic through the controller.
2. The system as claimed in claim 1, wherein the scan input of the scan chain of the scan chain set is selectively electrically connected to an output of an input decompressor while the scan output of the scan chain of the scan chain set is selectively electrically connected to an input of an output compressor.
3. The system as claimed in claim 1, wherein the scan chains are composed of a plurality of flip-flops that are connected in series and having a plurality of key flip-flops (KFFs) able to be selected randomly.
4. The system as claimed in claim 1, wherein the dynamic key generator includes a modified-linear feedback shift register (modified-LFSR) and a trigger logic electrically connected to the modified-LFSR.
5. The system as claimed in claim 1, wherein the secret key checking logic includes a plurality of XNOR (Exclusive NOR) gates, an AND gate electrically connected to the XNOR gates; and a D flip-flop electrically connected to the AND gate.
6. The system as claimed in claim 1, wherein the fake response generator includes a counter electrically connected to the dynamic key generator, a multiplexer electrically connected to both the counter and the scan chain set, and an XOR gate electrically connected to the multiplexer and the dynamic key generator.
7. A dynamic secret key security method for test circuit comprising the steps of: Step 1: selecting a plurality of key flip-flops (KFFs) from a plurality of scan chains of a scan chain set; Step 2: inputting a seed of a test vector into both the scan chains of the scan chain set and a dynamic key generator while the test vector is applied to the scan chains; Step 3: inputting the test vector into the scan chains in turn; then generating a secret key by the dynamic key generator and sending a comparison signal to a secret key checking logic by a controller after the test vector being completely input into the scan chains; and Step 4: comparing the test vector in the KFFs with the secret key from the dynamic key generator by the secret key checking logic and outputting a correct response when the test vector and the secret key from the dynamic key generator are the same; If the test vector and the secret key are not identical, outputting a fake response by a fake response generator.
8. The method as claimed in claim 7, wherein the scan chain set further includes a scan input, a scan output, a decompressor selectively electrically connected to the scan input and a compressor selectively electrically connected to the scan chains and the scan output.
9. The method as claimed in claim 7, wherein the dynamic key generator includes a modified-linear feedback shift register (LFSR) and a trigger logic electrically connected to the modified-LFSR; the trigger logic is used to alter the contents of the modified-LFSR when specific logic values appear at the inputs of the scan chains, which are also the inputs to the trigger logic.
10. The method as claimed in claim 7, wherein the secret key checking logic includes a plurality of XNOR (Exclusive NOR) gates, an AND gate electrically connected to the XNOR gates, and a D flip-flop electrically connected to the AND gate.
11. The method as claimed in claim 7, wherein the fake response generator includes a counter electrically connected to the dynamic key generator, a multiplexer electrically connected to both the counter and the scan chain set, and an XNOR gate electrically connected to the multiplexer and the dynamic key generator.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0010] The structure and the technical means adopted by the present invention to achieve the above and other objects can be best understood by referring to the following detailed description of the preferred embodiments and the accompanying drawings, wherein:
[0011]
[0012]
[0013]
[0014]
[0015]
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0016] Refer to
[0017] The dynamic key generator 3 consists of a modified-LFSR (linear feedback shift register) 31 and a trigger logic 32 electrically connected to the modified-LFSR 31. The secret key checking logic 4 is electrically connected to both the scan chain set 1 and the dynamic key generator 3 and is composed of a plurality of XNOR (Exclusive NOR) gates 41, an AND gate 42 electrically connected to the XNOR gates 41, and a D flip-flop 43 electrically connected to the AND gate 42. The fake response generator 5 which is electrically connected to the dynamic key generator 3 and the secret key checking logic 4 includes a counter 51, a multiplexer 52 and an XOR gate 53. The counter 51 is electrically connected to the dynamic key generator 3 while the multiplexer 52 is electrically connected to the counter 51 and the scan chain set 1. The XOR gate 53 is electrically connected to the multiplexer 52 and the dynamic key generator 3. As to the controller 6, it is electrically connected to the to dynamic key generator 3, the secret key checking logic 4 and the fake response generator 5.
[0018] A dynamic secret key security method for testing circuit according to the present invention includes the following steps.
[0019] Step 1: select a plurality of key flip-flops (KFFs) 13 from a plurality of scan chains 11 of a scan chain set 1.
[0020] Step 2: input a seed of a test vector 2 into the scan chains 11 of the scan chain set 1 and a dynamic key generator 3 while the test vector 2 is applied to the scan chains 11.
[0021] Step 3: input the test vector 2 into the respective scan chains 11 in turn; then generate a secret key by the dynamic key generator 3 and send a comparison signal to a secret key checking logic 4 by a controller 6 after the test vector 2 being completely input into the respective scan chains 11.
[0022] Step 4: compare the test vector 2 in the KFFs 13 with the secret key from the dynamic key generator 3 by the secret key checking logic 4 and output a correct response when the test vector 2 is the same as the secret key from the dynamic key generator 3. If the comparison result shows that they are not identical, output a fake response by a fake response generator 5.
[0023] Refer to
[0024]
[0025] At the moment, the controller 6 sends a comparison signal to the secret key checking logic 4. As shown in
[0026] Compared with the techniques available now, the present invention has the following advantages:
1. Based on the present security system and the method of the same, different secret keys are generated according to original data being input. Compared with the conventional techniques using fixed secret keys stored in the circuit, the present invention produces dynamic secret keys that achieve higher security level. Without the secret key stored previously, attackers are unable to obtain the secret key through cold boot attacks.
2. The present system and the method generate the fake responses by the fake response generator. The same fake response is produced for the same illegal test vector so as to confuse attackers.
3. The test vector with a secret key embedded in it can make the security design invisible.
4. Each test vector has its own seed, so every time the attacker wants to get the secret key, the attacker needs to crack from beginning. The present invention maintains a very high security level for each test vector.
5. The present invention does not change the structure of the original circuit under test (CUT), so the present invention cannot lose testability of the original CUT.
6. The present invention has low cost and high security, especially for large scale designs.
[0027] Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details, and representative devices shown and described herein. Accordingly, various modifications may be made without departing from the spirit or scope of the general inventive concept as defined by the appended claims and their equivalent.