SlideShare a Scribd company logo
1 of 6
Download to read offline
Athira S. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25
www.ijera.com 20|P a g e
Mixed Scanning and DFT Techniques for Arithmetic Core
Athira S , Manu Prasad
M Tech student, Assistant professor,
Electronics and communication department
ABSTRACT
Elliptic curve Cryptosystem used in cryptography chips undergoes side channel threats, where the attackers
deciphered the secret key from the scan path. The usage of extra electronic components in scan path architecture
will protect the secret key from threats. This work presents a new scan based flip flop for secure cryptographic
application. By adding more sensitive internal nets along with the scan enable the testing team can find out the
bugs in chip after post-silicon and even after chip fabrication. Also present a new mixed technique by adding
DFT(design for testing or Dfx unit) unit and scan unit in same chip unit without affecting the normal critical
path ,i.e. without affecting speed of operation of chip, latency in normal mode. Both Scan unit and DFT unit are
used for testing the sequential and combinational circuits present in 32 Bit Arithmetic core. Here a proposed PN
code generation unit as scan in port to increase the code coverage and scan out port efficiency. The proposed
system will written in verilog code and simulated using Xilinx Tool. The hardware module core is synthesized
using Xilinx Vertex 5 Field Programmable Gated Array (FPGA) kit. The performance utilization is reported
with the help of generated synthesis result.
Keywords: VLSI; Verilog; Testing; FPGA
I. INTRODUCTION
Cryptography is the method of storing and
transmitting data in a particular form so that only
whom it is intended can read and process it. There are
two techniques can be used in Cryptography. First one
is Encryption and second one is Decryption. The
conversion of plaintext into cipher text is called
Encryption, then back again known as Decryption. In
cryptography cryptosystem refers to a suite of
cryptographic algorithms needed to implement a
particular security service, most commonly for
achieving confidentiality. That is the information
cannot be understood by anyone for whom it was
unintended.
Elliptic curve cryptography (ECC) offers
best optimized solution with minimum resources like
low power, low memory, high throughput and
minimum key length. The Public key encryption
technique based on elliptic curve theory. It can be
used to create faster, smaller, and more efficient
cryptographic keys.ECC helps to establish security
with lower computing power and battery resource
usage. ECC used in cryptography chips undergoes
side channel threats, where the attackers deciphered
the secret key from the scan path. The Usage of extra
electronic components in scan path architecture will
protect the secret key from threats. This work presents
a more secure ECC Cryptosystem and a new scan
based flip flop for secure cryptographic application.
By adding more sensitive internal nets along with the
scan enable the testing team can find out the bugs in
chip after post-silicon and even after chip fabrication.
Also present a new mixed technique by adding DFT
(design for testing or Dfx unit) unit and Scan unit in
same chip unit.
In general testing is finding out how well
something works. Software testing is a process of
executing a program or application with the intent of
finding the software bugs. Here both Scan unit and
Dfx unit are used for testing the sequential and
combinational circuits present in 32 Bit Arithmetic
core.
The paper is organized as follow: In Existing system,
architecture of secured elliptic curve crypto chip. In
proposed system, architecture of more secured elliptic
curve system and system architecture. Then finally
Simulation and synthesis report for the proposed
system is presented .Encapsulation of the proposed
work is given in the conclusion.
II. EXISTING SYSTEM
In general there are few scan based
architecture which are introduced against side channel
scan attack. In paper [4], an additional NOT gate is
added to the flipped element. The functionality of the
Not gate is controlled through the multiplier.
Simultaneous launch of memory register element
along with scan flip-flop at certain places in
architecture shown in paper [5], but it is not been
practically proved. In paper [6] robust method is
introduced through modifying the particular
functionality of flip flop in the scan path but this
method undergo reset based attack and
implementation uses additional model scan control
RESEARCH ARTICLE OPEN ACCESS
Athira S. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25
www.ijera.com 21|P a g e
block in the circuit. Due to overhead of component in
[6], method based dynamic changes of flip flop in the
circuit using latch is introduced in paper [7], but this
process needs large number of clock cycles to
complete the process .In paper [1] a secured elliptic
curve cryptosystems for scan based VLSI architecture
used , The output from second flip flop is inverted and
given as one of the input to the XOR gate. The
another input for XOR gate is the non inverted form
of output from second flip flop. Both input produces
the scan out values always 1 Computed output cannot
able to make any comparison with the previous output
due to similarity in scan out The secured elliptic curve
cryptosystem through changing the functionality of
the scan path. Here a more secure elliptic curve crypto
system can be proposed .In this case the number of
flip-flops and number of tapping points are increased.
Which make a more complicate for hackers.
III. PROPOSED WORK
This work presents a new scan based flip
flop for secure cryptographic application. By adding
more sensitive internal nets along with the scan enable
the testing team can find out the bugs in chip after
post-silicon and even after chip fabrication. Also
proposing a new mixed technique by adding
DFT(design for testing) unit and Scan unit in same
chip unit without affecting the normal critical path
,i.e. without affecting speed of operation of chip,
latency in normal mode .Both scan unit and dfx unit
are used for testing the sequential and combinational
circuits present in 32Bit Arithmetic core.
The proposed system consist of Scan generation block
and other several units like Arithmetic Core unit ,Scan
unit, DFT unit , and MUX are Shown in Fig 3.1
Fig 3.1 Proposed System(System Architecture)
The Arithmetic core unit represent the
Functional Unit. It consist of instruction Register ,
Input Register and mainly a central processing unit
(CPU) which consists of Control unit and ALU. And
the ALU consist of adder unit only, this has been
shown in Fig 3.2
Input
reg.
Instruction Register
Adder
ALU
ARITH
METIC
CORE
Control unit
Fig 3.2 Arithmetic Core
Athira S. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25
www.ijera.com 22|P a g e
A) Modified Scan Generation Block
The modified scan generation block consist of 18
Flip-flops and a XOR gate. Here the output of 18th
Flip-flop is connected to the input of XOR gate and a
feedback mechanism can be used. It is shown in Fig
3.3
Fig 3.3 Modified Scan Generation Block
B) DFT Unit
The DFT unit consist of Dfx library and a comparator.
The adder consist of mainly two inputs. Also this
input will applied Reference adder. And it produces a
output and it will compare with the original adder
output. That is testing the combinational circuits. It is
shown in Fig 3.4
Input 1
Input 2
out
out
Test
out
compa
rater
Reference adder
adder
Fig 3.4 DFT Unit
C) Scan Unit
The scan unit consist of a comparator unit
and a counter unit. It is shown in Fig 3.5 The scan
generation block produces output which will give to
the input of the core. This input can be used only for
scanning. This input can also be applied to the counter
block and this block produces an output. And this
output will compare with the scanning output. That is
testing the sequential circuits. Here the input register
represents the sequential circuit.
Athira S. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25
www.ijera.com 23|P a g e
Comparator
Sequential
circuit
ARITHMETIC CORE
Counter unit
out
Scan generation
block
SCAN UNIT
Fig 3.5 Scan Unit
IV. EXPERIMENTAL RESULT
Implementation of proposed system is
simulated in Verilog Hardware Description Language
(HDL) for electronic circuit. The simulation result of
tested sequential circuit is shown in Fig 4.1and the
simulation result of tested combinational circuit is
shown in Fig 4.2.Also the RTL schematic of the top
module is shown in Fig 4.3.
Fig 4.1 Simulation Result of Tested Sequential Circuit
Fig 4.2 Simulation Result of Tested Combinational Circuit
Athira S. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25
www.ijera.com 24|P a g e
Fig 4.3 RTL schematic of the top module
V. CONCLUSION
The proposed system is a better option in
scan based flip flop for secure cryptographic
application. The mixed scanning and DFT techniques
can be used without effect the operation speed of chip.
Also proposed PN code generation unit as scan in
port to increase the code coverage. In the case of
modified scan generation block, it consist of more
than 2 tapping points. That is 4 tapping points. Hence
the security can be increased. Here a feedback
mechanism can be used, hence Easy to manage and It
can be tested with less effort. The Scan Generation
block is mainly used to give the more secure inputs at
the time of scanning. This does not effect the area.
The proposed system is applicable for
wireless communication, Online mobile banking
system, SIM cards, Identifications cards in
organizations. All the above system holds certain
sensitive information in the chip core which requires
certain amount of security. The elliptic curve
cryptography system provided the high level digital
security against unauthorized access from unwanted
person.
REFERENCES
[1]. Mr.K.P.Sridhar,Mr.M
Raguram,Dr.S.Saravanana”Secure Elliptic
Curve Cryptosystems For Scan Based VLSI
Architecture”ISBN,2014,IEEE
[2]. Nathan Jachimiec, Nick Iliev, and James
Stine, “Strategies forVLSI Implementations
of Finite Field Inversion Algorithms”, 48th
IEEEInternational Midwest Symposium on
Circuits and Systems, (pp. 1589 -1592),2005.
[3]. Gaurav Sengar, Debdeep Mukhopadhyay and
Dipanwita RoyChowdhury, Secured Flipped
Scan-Chain Model For Crypto-
Architecture,IEEE Transactions On
Computer-Aided Design Of Integrated
Circuits AndSystems, Vol. 26, No. 11,(pp.
2080 - 2084), 2007
[4]. Youhua Shi, Nozomu Togawa, Masao
Yanagisawa and TatsuoOhtsuki, Design-For-
Secure-Test For Crypto Cores, IEEE
InternationalTest Conference,(pp. 1), 2009.
[5]. Youhua Shi, Nozomu Togawa, Masao
Yanagisawa and TatsuoOhtsuki, Robust
Secure Scan Design Against Scan-Based
DifferentialCryptanalysis, IEEE Transactions
On Very Large Scale Integration
(VLSI)Systems, Vol. 20, Issue: 1,(pp. 176 -
181 ), 2012
[6]. Yuta Atobet, Youhua Shi, Masao
Yanagisawa and NozomuTogawat,
Dynamically Changeable Secure Scan
Architecture AgainstScan-Based Side
Channel Attack, IEEE Soc Design
Conference,(pp. 155 -158),2012.
[7]. Ajay Kumar, Kunal Lala and Amit Kumar
“VHDLImplementation using Elliptic Curve
Point Multiplication”, InternationalJournal of
Advanced Research in Computer and
CommunicationEngineering,(pp. 392 - 398),
2012.
[8]. Ryuta Nara, Nozomu Togawa, Masao
Yanagisawa and TatsuoOhtsuki “Scan-Based
Attack Against Elliptic Curve
Cryptosystems” InProceedings of IEEE ,(pp.
407 - 412),January2010.
[9]. Da Rolt, J.; Das A.; Di Natale, G.; Flottes,
M.-L.; Rouzeyre, B.;Verbauwhede, I.; , “A
New Scan Attack on RSA in Presence
ofIndustrial Countermeasures”, COSADE
2012, Lecture Notes inComputer Science
Volume 7275, 2012, pp 89-104.
[10]. Yang, B.; Wu, K.; Karri, R.; , "Scan based
side channel attack ondedicated hardware
implementations of Data Encryption
Standard,"International Test Conference,
2004.
Athira S. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25
www.ijera.com 25|P a g e
[11]. Yang, B.; Wu, K.; Karri, R.; , "Secure Scan:
A Design-for-TestArchitecture for Crypto
Chips," IEEE Transactions on Computer-
Aided Design of Integrated Circuits and
Systems, 2006.
[12]. Da Rolt, J.; Di Natale, G.; Flottes, M.-L.;
Rouzeyre, B.; , "Areadvanced DfT structures
sufficient for preventing scan-attacks?,VLSI
Test Symposium (VTS), 2011 IEEE, pp.246-
251, June 2012.
[13]. Liu, Y., Wu, K., Karri, R.; , “Scan-based
Attacks on LinearFeedback Shift Register
Based Stream Ciphers,” ACM
Transactionson Design Automation of
Electronic Systems (TODAES) 2011.
[14]. Jean Da Rolt, Bruno Rouzeyre, Marie-Lise
Flottes, Giorgio Di Natale, Amitabh Das,
Ingrid VerbauwhedeA .”Scan-based Attack
on Elliptic Curve Cryptosystems in presence
of Industrial Design-for-Testability
Structures”

More Related Content

What's hot

Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...Rahul Borthakur
 
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGADesign and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGAIJERA Editor
 
Design and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilogDesign and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilogSTEPHEN MOIRANGTHEM
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Online and Offline Testing Of C-Bist Using Sram
Online and Offline Testing Of C-Bist Using SramOnline and Offline Testing Of C-Bist Using Sram
Online and Offline Testing Of C-Bist Using Sramiosrjce
 
implementation of BIST
implementation of BISTimplementation of BIST
implementation of BISTPrabhu Kiran
 
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNAN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNEEIJ journal
 
第二周課程 Arduino介紹
第二周課程 Arduino介紹第二周課程 Arduino介紹
第二周課程 Arduino介紹冠宇 陳
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...IJMTST Journal
 
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...idescitation
 
FPGA Implementation of a GA
FPGA Implementation of a GAFPGA Implementation of a GA
FPGA Implementation of a GAHocine Merabti
 
A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...
A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...
A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...IRJET Journal
 
Eceg 3201-dld-lec 11-registers_and_asynchoronous_counters
Eceg 3201-dld-lec 11-registers_and_asynchoronous_countersEceg 3201-dld-lec 11-registers_and_asynchoronous_counters
Eceg 3201-dld-lec 11-registers_and_asynchoronous_countersNebiyu Musie
 
Toward Automatic Generation of Models with Probes from the SDL System Specifi...
Toward Automatic Generation of Models with Probes from the SDL System Specifi...Toward Automatic Generation of Models with Probes from the SDL System Specifi...
Toward Automatic Generation of Models with Probes from the SDL System Specifi...S56WBV
 

What's hot (20)

Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
 
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGADesign and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
 
Design and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilogDesign and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilog
 
Description fpga
Description fpgaDescription fpga
Description fpga
 
presentation_DRDO
presentation_DRDOpresentation_DRDO
presentation_DRDO
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Online and Offline Testing Of C-Bist Using Sram
Online and Offline Testing Of C-Bist Using SramOnline and Offline Testing Of C-Bist Using Sram
Online and Offline Testing Of C-Bist Using Sram
 
implementation of BIST
implementation of BISTimplementation of BIST
implementation of BIST
 
I044024549
I044024549I044024549
I044024549
 
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNAN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
 
第二周課程 Arduino介紹
第二周課程 Arduino介紹第二周課程 Arduino介紹
第二周課程 Arduino介紹
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
 
cd-2-Batch id-33
cd-2-Batch id-33cd-2-Batch id-33
cd-2-Batch id-33
 
FPGA Implementation of a GA
FPGA Implementation of a GAFPGA Implementation of a GA
FPGA Implementation of a GA
 
Cadancesimulation
CadancesimulationCadancesimulation
Cadancesimulation
 
A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...
A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...
A Comparative Study of PID and Fuzzy Controller for Speed Control of Brushles...
 
Av35266270
Av35266270Av35266270
Av35266270
 
Eceg 3201-dld-lec 11-registers_and_asynchoronous_counters
Eceg 3201-dld-lec 11-registers_and_asynchoronous_countersEceg 3201-dld-lec 11-registers_and_asynchoronous_counters
Eceg 3201-dld-lec 11-registers_and_asynchoronous_counters
 
Toward Automatic Generation of Models with Probes from the SDL System Specifi...
Toward Automatic Generation of Models with Probes from the SDL System Specifi...Toward Automatic Generation of Models with Probes from the SDL System Specifi...
Toward Automatic Generation of Models with Probes from the SDL System Specifi...
 

Viewers also liked

Katiusca Attajball y Luis Fuenmayo
Katiusca  Attajball y Luis FuenmayoKatiusca  Attajball y Luis Fuenmayo
Katiusca Attajball y Luis Fuenmayoeriannasotillo
 
Aquecimento global.Edit
Aquecimento global.EditAquecimento global.Edit
Aquecimento global.EditThierry Santos
 
Los ministerios, departamentos administrativos y superintendencias de colombia
Los ministerios, departamentos administrativos y superintendencias de colombiaLos ministerios, departamentos administrativos y superintendencias de colombia
Los ministerios, departamentos administrativos y superintendencias de colombiaYurgen Caceres Amaya
 
Special elit 17 syllabus fall 2016
Special elit 17 syllabus fall 2016 Special elit 17 syllabus fall 2016
Special elit 17 syllabus fall 2016 jordanlachance
 
Webjornalismo participativo e a produção aberta de notícias
Webjornalismo participativo e a produção aberta de notíciasWebjornalismo participativo e a produção aberta de notícias
Webjornalismo participativo e a produção aberta de notíciasAlex Primo
 
Phillips Ind Rec letter
Phillips Ind Rec letterPhillips Ind Rec letter
Phillips Ind Rec letterChris Clemons
 
Apresentação 3DBeam : Análise de Vigas, Pórticos e Grelhas
Apresentação 3DBeam : Análise de Vigas, Pórticos e GrelhasApresentação 3DBeam : Análise de Vigas, Pórticos e Grelhas
Apresentação 3DBeam : Análise de Vigas, Pórticos e GrelhasJoão Henrique Volpini Mattos
 
Criatividade e beleza em imagens c.f. s -livre
Criatividade e beleza em imagens  c.f.  s -livreCriatividade e beleza em imagens  c.f.  s -livre
Criatividade e beleza em imagens c.f. s -livrecarlos2627
 
Nortel NT5K21BA
Nortel NT5K21BANortel NT5K21BA
Nortel NT5K21BAsavomir
 
Relacao nominal alunos premiados ee marcílio augusto pinto
Relacao nominal alunos premiados   ee marcílio augusto pintoRelacao nominal alunos premiados   ee marcílio augusto pinto
Relacao nominal alunos premiados ee marcílio augusto pintoregiani36
 
Formação em augusto corrêa pa
Formação em augusto corrêa paFormação em augusto corrêa pa
Formação em augusto corrêa paNTE Bragantino
 
Referencial 20111018124117
Referencial 20111018124117Referencial 20111018124117
Referencial 20111018124117ben
 
2007 04-07- introdução - thiago martini
2007 04-07- introdução - thiago martini2007 04-07- introdução - thiago martini
2007 04-07- introdução - thiago martiniJéssica Caravante
 
Curso de chadrez
Curso de chadrezCurso de chadrez
Curso de chadrezjwfb
 
Contabilidade geral i cap 05 slides - contas resultado
Contabilidade geral i cap 05   slides - contas resultadoContabilidade geral i cap 05   slides - contas resultado
Contabilidade geral i cap 05 slides - contas resultadogabaritocontabil
 
Economize o planeta 9º ano
Economize o planeta 9º anoEconomize o planeta 9º ano
Economize o planeta 9º anoJaneffer Souza
 
Arte latas -empilhadas-c.f.
Arte latas -empilhadas-c.f.Arte latas -empilhadas-c.f.
Arte latas -empilhadas-c.f.carlos2627
 

Viewers also liked (20)

Katiusca Attajball y Luis Fuenmayo
Katiusca  Attajball y Luis FuenmayoKatiusca  Attajball y Luis Fuenmayo
Katiusca Attajball y Luis Fuenmayo
 
Aquecimento global.Edit
Aquecimento global.EditAquecimento global.Edit
Aquecimento global.Edit
 
Los ministerios, departamentos administrativos y superintendencias de colombia
Los ministerios, departamentos administrativos y superintendencias de colombiaLos ministerios, departamentos administrativos y superintendencias de colombia
Los ministerios, departamentos administrativos y superintendencias de colombia
 
Special elit 17 syllabus fall 2016
Special elit 17 syllabus fall 2016 Special elit 17 syllabus fall 2016
Special elit 17 syllabus fall 2016
 
Webjornalismo participativo e a produção aberta de notícias
Webjornalismo participativo e a produção aberta de notíciasWebjornalismo participativo e a produção aberta de notícias
Webjornalismo participativo e a produção aberta de notícias
 
Phillips Ind Rec letter
Phillips Ind Rec letterPhillips Ind Rec letter
Phillips Ind Rec letter
 
Apresentação 3DBeam : Análise de Vigas, Pórticos e Grelhas
Apresentação 3DBeam : Análise de Vigas, Pórticos e GrelhasApresentação 3DBeam : Análise de Vigas, Pórticos e Grelhas
Apresentação 3DBeam : Análise de Vigas, Pórticos e Grelhas
 
Raios e futebol
Raios e futebolRaios e futebol
Raios e futebol
 
Criatividade e beleza em imagens c.f. s -livre
Criatividade e beleza em imagens  c.f.  s -livreCriatividade e beleza em imagens  c.f.  s -livre
Criatividade e beleza em imagens c.f. s -livre
 
Nortel NT5K21BA
Nortel NT5K21BANortel NT5K21BA
Nortel NT5K21BA
 
Relacao nominal alunos premiados ee marcílio augusto pinto
Relacao nominal alunos premiados   ee marcílio augusto pintoRelacao nominal alunos premiados   ee marcílio augusto pinto
Relacao nominal alunos premiados ee marcílio augusto pinto
 
Formação em augusto corrêa pa
Formação em augusto corrêa paFormação em augusto corrêa pa
Formação em augusto corrêa pa
 
Referencial 20111018124117
Referencial 20111018124117Referencial 20111018124117
Referencial 20111018124117
 
DIPLOMA NAPLATA (2)
DIPLOMA NAPLATA (2)DIPLOMA NAPLATA (2)
DIPLOMA NAPLATA (2)
 
2007 04-07- introdução - thiago martini
2007 04-07- introdução - thiago martini2007 04-07- introdução - thiago martini
2007 04-07- introdução - thiago martini
 
Curso de chadrez
Curso de chadrezCurso de chadrez
Curso de chadrez
 
Contabilidade geral i cap 05 slides - contas resultado
Contabilidade geral i cap 05   slides - contas resultadoContabilidade geral i cap 05   slides - contas resultado
Contabilidade geral i cap 05 slides - contas resultado
 
Empreendedorismo
EmpreendedorismoEmpreendedorismo
Empreendedorismo
 
Economize o planeta 9º ano
Economize o planeta 9º anoEconomize o planeta 9º ano
Economize o planeta 9º ano
 
Arte latas -empilhadas-c.f.
Arte latas -empilhadas-c.f.Arte latas -empilhadas-c.f.
Arte latas -empilhadas-c.f.
 

Similar to Mixed Scanning and DFT Techniques for Arithmetic Core

Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
E0364025031
E0364025031E0364025031
E0364025031theijes
 
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...IJCI JOURNAL
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...eSAT Journals
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
 
Basic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filterBasic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filtereSAT Journals
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
FPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace BufferFPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace Bufferpaperpublications3
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...VIT-AP University
 
Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...IRJET Journal
 
Design of Multiplier Less 32 Tap FIR Filter using VHDL
Design of Multiplier Less 32 Tap FIR Filter using VHDLDesign of Multiplier Less 32 Tap FIR Filter using VHDL
Design of Multiplier Less 32 Tap FIR Filter using VHDLIJMER
 
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET Journal
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...IJNSA Journal
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityIRJET Journal
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...IRJET Journal
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithmeSAT Journals
 

Similar to Mixed Scanning and DFT Techniques for Arithmetic Core (20)

Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
E0364025031
E0364025031E0364025031
E0364025031
 
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
 
G05124550
G05124550G05124550
G05124550
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
 
Basic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filterBasic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filter
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
FPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace BufferFPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace Buffer
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
 
Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...
 
vorlage
vorlagevorlage
vorlage
 
Design of Multiplier Less 32 Tap FIR Filter using VHDL
Design of Multiplier Less 32 Tap FIR Filter using VHDLDesign of Multiplier Less 32 Tap FIR Filter using VHDL
Design of Multiplier Less 32 Tap FIR Filter using VHDL
 
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...IRJET -  	  High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
 
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 

Recently uploaded

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 

Recently uploaded (20)

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 

Mixed Scanning and DFT Techniques for Arithmetic Core

  • 1. Athira S. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25 www.ijera.com 20|P a g e Mixed Scanning and DFT Techniques for Arithmetic Core Athira S , Manu Prasad M Tech student, Assistant professor, Electronics and communication department ABSTRACT Elliptic curve Cryptosystem used in cryptography chips undergoes side channel threats, where the attackers deciphered the secret key from the scan path. The usage of extra electronic components in scan path architecture will protect the secret key from threats. This work presents a new scan based flip flop for secure cryptographic application. By adding more sensitive internal nets along with the scan enable the testing team can find out the bugs in chip after post-silicon and even after chip fabrication. Also present a new mixed technique by adding DFT(design for testing or Dfx unit) unit and scan unit in same chip unit without affecting the normal critical path ,i.e. without affecting speed of operation of chip, latency in normal mode. Both Scan unit and DFT unit are used for testing the sequential and combinational circuits present in 32 Bit Arithmetic core. Here a proposed PN code generation unit as scan in port to increase the code coverage and scan out port efficiency. The proposed system will written in verilog code and simulated using Xilinx Tool. The hardware module core is synthesized using Xilinx Vertex 5 Field Programmable Gated Array (FPGA) kit. The performance utilization is reported with the help of generated synthesis result. Keywords: VLSI; Verilog; Testing; FPGA I. INTRODUCTION Cryptography is the method of storing and transmitting data in a particular form so that only whom it is intended can read and process it. There are two techniques can be used in Cryptography. First one is Encryption and second one is Decryption. The conversion of plaintext into cipher text is called Encryption, then back again known as Decryption. In cryptography cryptosystem refers to a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality. That is the information cannot be understood by anyone for whom it was unintended. Elliptic curve cryptography (ECC) offers best optimized solution with minimum resources like low power, low memory, high throughput and minimum key length. The Public key encryption technique based on elliptic curve theory. It can be used to create faster, smaller, and more efficient cryptographic keys.ECC helps to establish security with lower computing power and battery resource usage. ECC used in cryptography chips undergoes side channel threats, where the attackers deciphered the secret key from the scan path. The Usage of extra electronic components in scan path architecture will protect the secret key from threats. This work presents a more secure ECC Cryptosystem and a new scan based flip flop for secure cryptographic application. By adding more sensitive internal nets along with the scan enable the testing team can find out the bugs in chip after post-silicon and even after chip fabrication. Also present a new mixed technique by adding DFT (design for testing or Dfx unit) unit and Scan unit in same chip unit. In general testing is finding out how well something works. Software testing is a process of executing a program or application with the intent of finding the software bugs. Here both Scan unit and Dfx unit are used for testing the sequential and combinational circuits present in 32 Bit Arithmetic core. The paper is organized as follow: In Existing system, architecture of secured elliptic curve crypto chip. In proposed system, architecture of more secured elliptic curve system and system architecture. Then finally Simulation and synthesis report for the proposed system is presented .Encapsulation of the proposed work is given in the conclusion. II. EXISTING SYSTEM In general there are few scan based architecture which are introduced against side channel scan attack. In paper [4], an additional NOT gate is added to the flipped element. The functionality of the Not gate is controlled through the multiplier. Simultaneous launch of memory register element along with scan flip-flop at certain places in architecture shown in paper [5], but it is not been practically proved. In paper [6] robust method is introduced through modifying the particular functionality of flip flop in the scan path but this method undergo reset based attack and implementation uses additional model scan control RESEARCH ARTICLE OPEN ACCESS
  • 2. Athira S. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25 www.ijera.com 21|P a g e block in the circuit. Due to overhead of component in [6], method based dynamic changes of flip flop in the circuit using latch is introduced in paper [7], but this process needs large number of clock cycles to complete the process .In paper [1] a secured elliptic curve cryptosystems for scan based VLSI architecture used , The output from second flip flop is inverted and given as one of the input to the XOR gate. The another input for XOR gate is the non inverted form of output from second flip flop. Both input produces the scan out values always 1 Computed output cannot able to make any comparison with the previous output due to similarity in scan out The secured elliptic curve cryptosystem through changing the functionality of the scan path. Here a more secure elliptic curve crypto system can be proposed .In this case the number of flip-flops and number of tapping points are increased. Which make a more complicate for hackers. III. PROPOSED WORK This work presents a new scan based flip flop for secure cryptographic application. By adding more sensitive internal nets along with the scan enable the testing team can find out the bugs in chip after post-silicon and even after chip fabrication. Also proposing a new mixed technique by adding DFT(design for testing) unit and Scan unit in same chip unit without affecting the normal critical path ,i.e. without affecting speed of operation of chip, latency in normal mode .Both scan unit and dfx unit are used for testing the sequential and combinational circuits present in 32Bit Arithmetic core. The proposed system consist of Scan generation block and other several units like Arithmetic Core unit ,Scan unit, DFT unit , and MUX are Shown in Fig 3.1 Fig 3.1 Proposed System(System Architecture) The Arithmetic core unit represent the Functional Unit. It consist of instruction Register , Input Register and mainly a central processing unit (CPU) which consists of Control unit and ALU. And the ALU consist of adder unit only, this has been shown in Fig 3.2 Input reg. Instruction Register Adder ALU ARITH METIC CORE Control unit Fig 3.2 Arithmetic Core
  • 3. Athira S. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25 www.ijera.com 22|P a g e A) Modified Scan Generation Block The modified scan generation block consist of 18 Flip-flops and a XOR gate. Here the output of 18th Flip-flop is connected to the input of XOR gate and a feedback mechanism can be used. It is shown in Fig 3.3 Fig 3.3 Modified Scan Generation Block B) DFT Unit The DFT unit consist of Dfx library and a comparator. The adder consist of mainly two inputs. Also this input will applied Reference adder. And it produces a output and it will compare with the original adder output. That is testing the combinational circuits. It is shown in Fig 3.4 Input 1 Input 2 out out Test out compa rater Reference adder adder Fig 3.4 DFT Unit C) Scan Unit The scan unit consist of a comparator unit and a counter unit. It is shown in Fig 3.5 The scan generation block produces output which will give to the input of the core. This input can be used only for scanning. This input can also be applied to the counter block and this block produces an output. And this output will compare with the scanning output. That is testing the sequential circuits. Here the input register represents the sequential circuit.
  • 4. Athira S. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25 www.ijera.com 23|P a g e Comparator Sequential circuit ARITHMETIC CORE Counter unit out Scan generation block SCAN UNIT Fig 3.5 Scan Unit IV. EXPERIMENTAL RESULT Implementation of proposed system is simulated in Verilog Hardware Description Language (HDL) for electronic circuit. The simulation result of tested sequential circuit is shown in Fig 4.1and the simulation result of tested combinational circuit is shown in Fig 4.2.Also the RTL schematic of the top module is shown in Fig 4.3. Fig 4.1 Simulation Result of Tested Sequential Circuit Fig 4.2 Simulation Result of Tested Combinational Circuit
  • 5. Athira S. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25 www.ijera.com 24|P a g e Fig 4.3 RTL schematic of the top module V. CONCLUSION The proposed system is a better option in scan based flip flop for secure cryptographic application. The mixed scanning and DFT techniques can be used without effect the operation speed of chip. Also proposed PN code generation unit as scan in port to increase the code coverage. In the case of modified scan generation block, it consist of more than 2 tapping points. That is 4 tapping points. Hence the security can be increased. Here a feedback mechanism can be used, hence Easy to manage and It can be tested with less effort. The Scan Generation block is mainly used to give the more secure inputs at the time of scanning. This does not effect the area. The proposed system is applicable for wireless communication, Online mobile banking system, SIM cards, Identifications cards in organizations. All the above system holds certain sensitive information in the chip core which requires certain amount of security. The elliptic curve cryptography system provided the high level digital security against unauthorized access from unwanted person. REFERENCES [1]. Mr.K.P.Sridhar,Mr.M Raguram,Dr.S.Saravanana”Secure Elliptic Curve Cryptosystems For Scan Based VLSI Architecture”ISBN,2014,IEEE [2]. Nathan Jachimiec, Nick Iliev, and James Stine, “Strategies forVLSI Implementations of Finite Field Inversion Algorithms”, 48th IEEEInternational Midwest Symposium on Circuits and Systems, (pp. 1589 -1592),2005. [3]. Gaurav Sengar, Debdeep Mukhopadhyay and Dipanwita RoyChowdhury, Secured Flipped Scan-Chain Model For Crypto- Architecture,IEEE Transactions On Computer-Aided Design Of Integrated Circuits AndSystems, Vol. 26, No. 11,(pp. 2080 - 2084), 2007 [4]. Youhua Shi, Nozomu Togawa, Masao Yanagisawa and TatsuoOhtsuki, Design-For- Secure-Test For Crypto Cores, IEEE InternationalTest Conference,(pp. 1), 2009. [5]. Youhua Shi, Nozomu Togawa, Masao Yanagisawa and TatsuoOhtsuki, Robust Secure Scan Design Against Scan-Based DifferentialCryptanalysis, IEEE Transactions On Very Large Scale Integration (VLSI)Systems, Vol. 20, Issue: 1,(pp. 176 - 181 ), 2012 [6]. Yuta Atobet, Youhua Shi, Masao Yanagisawa and NozomuTogawat, Dynamically Changeable Secure Scan Architecture AgainstScan-Based Side Channel Attack, IEEE Soc Design Conference,(pp. 155 -158),2012. [7]. Ajay Kumar, Kunal Lala and Amit Kumar “VHDLImplementation using Elliptic Curve Point Multiplication”, InternationalJournal of Advanced Research in Computer and CommunicationEngineering,(pp. 392 - 398), 2012. [8]. Ryuta Nara, Nozomu Togawa, Masao Yanagisawa and TatsuoOhtsuki “Scan-Based Attack Against Elliptic Curve Cryptosystems” InProceedings of IEEE ,(pp. 407 - 412),January2010. [9]. Da Rolt, J.; Das A.; Di Natale, G.; Flottes, M.-L.; Rouzeyre, B.;Verbauwhede, I.; , “A New Scan Attack on RSA in Presence ofIndustrial Countermeasures”, COSADE 2012, Lecture Notes inComputer Science Volume 7275, 2012, pp 89-104. [10]. Yang, B.; Wu, K.; Karri, R.; , "Scan based side channel attack ondedicated hardware implementations of Data Encryption Standard,"International Test Conference, 2004.
  • 6. Athira S. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -3) October 2016, pp.20-25 www.ijera.com 25|P a g e [11]. Yang, B.; Wu, K.; Karri, R.; , "Secure Scan: A Design-for-TestArchitecture for Crypto Chips," IEEE Transactions on Computer- Aided Design of Integrated Circuits and Systems, 2006. [12]. Da Rolt, J.; Di Natale, G.; Flottes, M.-L.; Rouzeyre, B.; , "Areadvanced DfT structures sufficient for preventing scan-attacks?,VLSI Test Symposium (VTS), 2011 IEEE, pp.246- 251, June 2012. [13]. Liu, Y., Wu, K., Karri, R.; , “Scan-based Attacks on LinearFeedback Shift Register Based Stream Ciphers,” ACM Transactionson Design Automation of Electronic Systems (TODAES) 2011. [14]. Jean Da Rolt, Bruno Rouzeyre, Marie-Lise Flottes, Giorgio Di Natale, Amitabh Das, Ingrid VerbauwhedeA .”Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-for-Testability Structures”