| Literature DB >> 34941912 |
Fakir Sharif Hossain1, Taiyeb Hasan Sakib2, Muhammad Ashar3, Rian Ferdian4.
Abstract
Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform's reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government. Its hardware implementation offers much higher speed and physical security than that of its software implementation. The testability and hardware Trojans are two significant concerns that make the AES chip complex and vulnerable. The problem of testability in the complex AES chip is not addressed yet, and also, the hardware Trojan insertion into the chip may be a significant security threat by leaking information to the intruder. The proposed method is a dual-mode self-test architecture that can detect the hardware Trojans at the manufacturing test and perform an online parametric test to identify parametric chip defects. This work contributes to partitioning the AES circuit into small blocks and comparing adjacent blocks to ensure self-referencing. The detection accuracy is sharpened by a comparative power ratio threshold, determined by process variations and the accuracy of the built-in current sensors. This architecture can reduce the delay, power consumption, and area overhead compared to other works.Entities:
Mesh:
Year: 2021 PMID: 34941912 PMCID: PMC8699703 DOI: 10.1371/journal.pone.0261431
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1A general dual-mode self-test (DMST) structure.
Fig 2Definition of nodes, adjacent blocks, region, distance threshold and PEAB pairs.
Fig 3Flowchart representation of the proposed PEAB pair generation.
Fig 4The clock-tree partitioning algorithm that partitions clock nodes into blocks.
Fig 5VOPs insertion in untoggled cells or nets: (a) ATPG patterns can not sensitize net C, (b) VOP insertion can ensure the untoggled net C toggling.
Fig 6The layout of the AES chip with 16 current sensors.
Fig 7Self-referencing with built-in current sensors and memory hardware.
Fig 8Distribution of nominal power values of first 10 blocks for the AES-128 show a Gaussian distribution.
Area, power and delay overhead of the AES-128 circuit with clock skew information.
| Attributes | Value |
|---|---|
| Initial end node clock buffers or blocks | 50 |
| Selected blocks considering mean dynamic power | 42 |
| Number of shifted flip-flops | 100 |
| Hardware overhead | 0.134% |
| VOP insertion overhead | 0.0% |
| Average power per block (overhead) | 0.542% |
| Worst case delay overhead | 0.0124% |
| Longest path delay without gating | 0.592ns |
| Longest path delay with gating controller | 0.592ns |
| Shortest path delay without gating | 0.525ns |
| Shortest path delay with gating controller | 0.523ns |
A detailed result of hardware overhead, power and delay with and without scan design.
| Event | Complete design | Scan design | Test contr. | Memory | ADC | Comparator circuit |
|---|---|---|---|---|---|---|
| Total Area in um width | 2163275.57 | 110275.2 | 1968.58 | 520 | 241.34 | 163.18 |
| Area Overhead | 5.239% | 5.097% | 0.091% | 0.024% | 0.011% | 0.007% |
| Avg. power per block in mW | 17.521 | 3.627 | 0.0647 | 0.0171 | 0.0079 | 0.0053 |
| Power overhead per block | 21.073% | 20.703% | 0.369% | 0.098% | 0.045% | 0.031% |
| Critical path delay in ps | 592 | 178.38 | 50.078 | 13.228 | 6.139 | 4.151 |
| Delay overhead | 42.56% | 30.132% | 8.459% | 2.234% | 1.037% | 0.701% |
Fig 9Cumulative distribution function of 60,000 sample for identification of faulty chips.
Faulty AES chip identification for different faults and Trojans under low, medium, high and very high variation cases.
| Events | Max CPR | Identification in different variation cases | |||
|---|---|---|---|---|---|
| Low | Medium | High | Very high | ||
| Stuck-at-fault | 8.50% | 100% | 100% | 99% | 97% |
| Bridging fault | 9.10% | 100% | 100% | 100% | 98% |
| Propagation delay | 10% | 100% | 100% | 100% | 99% |
| Trojan TR1 | 10.30% | 100% | 100% | 100% | 99% |
| Trojan TR2 | 7.80% | 100% | 99% | 95% | 91% |
| Trojan AES-T300 | 13.57% | 100% | 100% | 100% | 100% |
| Trojan AES-T400 | 11.33% | 100% | 100% | 100% | 99% |
Comparison with the state of the art fault and Trojan detection of AES in dual mode self-test implementation.
| Method name | Detection mode | Exploit mechanism | Design overhead |
|---|---|---|---|
| OBISA: Obfuscated built-in self authentication with wire-lifting [ | Trojan Detection | Filler cell insertion and wire lifting | Delay = 4.08% |
| TPAD: Trojan prevention and detection [ | Trojan detection using fault tolerant computing | functional and online detection technique | Delay = 0% |
| BISA: Built-In Self Authentication [ | Trojan prevention | Filler cell insertion | Delay = 4.28% |
| K-security: 3D IC based circuit [ | Trojan prevention | Wire lifting | Delay = 54% |
| Online error detection for AES core [ | Fault detection | Parity code | Delay = 2.4% |
| A-SOFT-AES: Self-Adaptive Software based AES [ | Fault Detection | Soft implementation | Delay = NA |
| Hybrid-AES: Pipeline based Hardware design [ | Error Detection | Hybrid implementation | Delay = 1.27% |
| Proposed DMST: Dual mode self-test | Identification faults and Trojans in online | Variation aware self-referencing | Delay = 0.012% |