tag 标签: cryptography

相关博文
  • 热度 18
    2013-3-12 21:18
    1851 次阅读|
    0 个评论
    Note : As the Spring 2013 Embedded Systems Conference at DESIGN West is only weeks away, I recently had a chance to talk with Pankaj Rohatgi, technical director of hardware security solutions at Cryptography Research about one of the growing security problems in embedded systems: side channel attacks. He led two sessions at the recent RSA Conference on side channel attacks both from a key extraction perspective, looking at the NSA's Suite B cryptography; and from a developer's perspective—looking at proper and practical ways to test embedded devices to see if they are vulnerable to side channel attacks. BC: Let's start from the beginning with a refresher on side channel attacks. What exactly are we talking about? If you look at hardware devices which are doing security operations, most of the time they have a secret cryptographic key embedded in the hardware. When dealing with hardware or software, if you're using a secret cryptographic key, and if someone is able to monitor the power consumption of hardware or the emission coming from the device, you are able to recover the key using a set of techniques known as side channel attacks. BC: Where is the side channel problem? Is it mostly mobile devices? Is it in all connected devices? Wireless devices? The problem is universal with any connected device, but the implication of where attackers would focus on depends on the value being protected. So today we are seeing a lot of interest in the smart power grid space. Traditionally, a lot of the concern has been in the financial industry, but today it is in the smart grid. There's a lot of interest there because at the substation level, some of the equipment can be quite damaging if someone was to attack it, as it is out there in the field and relatively open. Additionally, we are seeing an interest in smart phones. At last year's RSA, we showed that if someone is within ten feet of a phone, it's possible to pick out a cryptographic operation that a phone might be doing. BC: And what kinds of risks, in the case of smart phones for instance, do you see developing? Smart phones present two major issues: one is transactions, while the other is content management. In the case of content, studios are considering using smart phones for that kind of content. In fact, right now there is a lot of pressure on smart phone manufacturers to provide digital rights management on the smart phones they are producing because of this content issue. With regard to transactions, much of the problem is that security techniques on these phones is the same as secure system design. When you hear people talking about the secure part of the phone and insecure part of the phone, they are talking about software. However, the issue with smart phones is that we're not just talking about software—we're dealing with a mobile phone. Possession of the phone itself creates issues, as an individual must place the phone next to a reader in order to make a payment, or theoretically open a secure door by putting the phone next to a reader. BC: With regards to your presentations at RSA, you discussed how even mathematically secure cryptography could be infiltrated using side channel attacks. Could you provide some background on that session and how it applies to these threat vectors? The first session involves the extraction of keys from devices executing Suite B algorithms. Suite B algorithms are used by the National Security Agency (NSA) for instances when they have to collaborate with other coalition partners like the Department of Defense, or if they are called in and need to work with non-government organisations. These algorithms were made public and authorised to protect classified, sensitive or top secret information. So the first talk we are going to be presenting at the conference looks at what happens when you implement these algorithms in software and hardware—and how easy it can be for an attacker to extract the key just by observing the emissions of the device. We will show an example of each in the talk, using different algorithms and devices. If you look at the algorithms from a mathematical perspective, they're highly secured. They've been designed to resist attack where the attacker can only see the input of the algorithm and the output. However, in real life what happens is you get a lot more information than just the input and the output. There are a lot of side channels you can get. You can time how much it takes to do the operation, which is valuable extra information. You can see how the power of the consumption of your FPGA varies as it's computing the algorithm. You can see what emissions are coming out. This gives you extra information about the secret keys that are buried in the hardware. If the device does the operation repeatedly, and uses the key for a few hundred operations, it's possible to get enough information to recover that key. BC: So the first session was essentially about demonstrating the problems of supposedly secure cryptography with regards to side channel attacks. What is the take-away for electrical engineers? Yes. It's demonstrating the problems with side channels and kind of making the point that just because the algorithm is left for use by the NSA, it doesn't mean that the implementation is any stronger in terms of these attacks. If you go to the web and look for military grade encryption, you will find lots and lots of it. There are many products where people think that if it's good enough for the government, then the algorithm is safe for cryptographic purposes and therefore secure. Now everyone wants to adopt Suite B because they are algorithms you can trust. Another place Suite B algorithms are used is in ID cards. It could be a driver's licence or a passport. So far, that's what happened, as people have implemented these algorithms and actually the security is not much higher, because you can have side channel vulnerabilities that can easily uncover these keys. BC: That's a good segue into your second session, which deals with how to practically and effectively test for side channel leakage. That's right. When we look around, we see that people recognise the problem of side channel. They see that smart phones have side channel problems, smart grid components have side channel problems, and hardware security modules have side channel problems. As a result, people are scrambling to put standards and requirements in place to do that. For example, it is in the new draft version of their standards that are applied to all cryptographic modules and side channel requirements are being put in there. We have many customers who come to us, because we are seen as leaders in the side channel space, and they're saying, "What kind of requirements or qualification testing should we put in place for our suppliers? We recognise there is a problem and we want to know how they should be tested." If you look at what the state of the art testing is, it is probably what general security testing was many years ago. It is done for common criteria, and financial devices. It follows more of a corrective methodology. BC: What was that? Corrective methodology. Where basically you give a device to someone and they try to break it, they try all different attacks on it. If they break the key, then that means it is insecure. However, if that's the way the product is going to be tested, it's going to be very costly and difficult to do. For example, I'm a company who wants to create a side channel resistance product. How do I do that? I need to find a prototype. I'm going to need experts who know all about side channel and are going to try all kinds of attacks on it to see if the key can be extracted. Some people can afford that, but for most people it is too costly and time consuming. You can out-grow a team of experts on this topic so easily. This is true in the security space as well. Previously, people wondered how to test security, and they would rely on hackers. The hackers try to break it and if they do, it is insecure, if they don't, then that's okay. And that's how it used to be. This is pretty much where we are today with side channel testing. It's hard to create a regime of testing that is cost effective or manufactured to find out what the problems are. We cannot be hiding these attackers. What we are talking about in the second presentation is a methodology that we are proposing that will change the way testing is done for side channel. It will be more efficient, cost effective, and we are hoping it is equally as good as penetration testing. The idea is more for of an evaluation technique, where we have test vectors that we supply to your device and we look for specific leakage. We are not trying to attack and extract keys. We are only looking for a leakage. Today when you look at security testing, they don't try to break them, they run some test vectors to see if there is a potential problem that can lead to attacks later on, and that is what we are doing with side channel attacks. We do some measurements and tests to see leakage. And that's all we really care about. We don't care about the keys. If you just want to qualify a device, you don't need to take that extra test. BC: So theoretically, these tests could be done by non-experts? Yes, that means the test can be done by someone who's not an expert. Someone with an electrical engineering degree who can take some measurements, can run the rest. It doesn't take very long—maybe a few hours—then you get the results. At that point, the designer can look at the results and fix the problem. It is quick feedback on the problem and it doesn't require you to be an expert. That's our contribution to the community. We are proposing these tests and also asking others to contribute. We want a set of tests that can cover the various types of leakages that can result in problems. I think this is elevating the whole testing effort on the side channel attacks to a level that can be done at the test stage of the design. That's what we are talking about in the second presentation. BC: And is this something to be applied broadly? Mobile developers? Embedded developers? They don't have to have someone on the team who is a crypto or anything? Just a specialist or someone who understands this set of procedures? Yes. Indeed. And that's the purpose. The people who are developers or even testing labs, for example, if you look at Lift, they have this set of cryptographic modules. So it's also very checklist-based. They didn't know how to handle side channel so now that we came up with this approach, it was very well received by Lift and their programmers. We were asked to present to their lab managers, so they could see that this is something they could do. Some of the crypto evaluations were easier, which are definitely quicker and cheaper. They're interested in this. We also see a lot of interest in the communities like smart phones. They are looking for quick ways to qualify their devices, or even internally test them for development. BC: So because this doesn't involve any special software, it could be applied to almost any platform no matter how sophisticated or not sophisticated. I was thinking that since many of these systems get going with dozens of these devices in a home or in an building environment and they don't have a lot of resources. So you need to make sure that they are secure. And this would be a procedure that would allow you to fix this problem. That's correct. We would expect or want someone to be a good double "E," though.
  • 热度 16
    2011-6-9 18:13
    2026 次阅读|
    0 个评论
    Two months after an NSA official said there is no longer any such thing as "secure" computing, pioneers of the field of cryptography gathered for their annual panel discussion at the RSA Conference in San Francisco. A few months ago, Debora Plunkett director of the Information Assurance Directorate (IAD) at the U.S. National Security Agency (NSA), made headlines when she told attendees at a cyber security forum that there is "no such thing as 'secure' anymore."   What Plunkett meant, according to Dickie George, technical director of the NSA's IAD, is that there has been a paradigm shift in network and computer security: rather than focusing all efforts on keeping intruders out, the reality of today's world forces security teams to assume that adversaries can and do access their networks.   While keeping intruders out is still the primary objective, George said during the annual Cryptographers' Panel at the RSA Conference 2011 in San Francisco, monitoring today's networks requires keeping a vigilant eye out within for uncharacteristic or "inappropriate" behavior.   "If you assume they haven't been , you are setting yourself up for a shock," George said.   George and fellow panelists, including Ronald Rivest, the Viterbi professor of electrical engineering and computer science at MIT, said cryptography remains the best tool available for ensuring network security. But they noted that cryptography has its limitations.   "Cryptography provides the tools, but I think the problem we are facing is the rash of technology development," Rivest said. "We keep building fences, but the universe keeps growing."   Adi Shamir, professor of computer science at Israel's Weizmann Institute of Science, noted that the two biggest network security issues of the past yearthe WikiLeaks controversy and the Stuxnet computer worm attack that reportedly damaged as many as one fifth of Iran's nuclear centrifugescould not have been prevented with cryptography.   "It's interesting to me that the two biggest attacks of the last year had nothing to do with cryptography," Shamir said.   But though they acknowledged that cryptographer has its limitations, panelistspioneers in fieldalso emphasized that ongoing cryptography research is still of great value.   Martin Hellman, professor emeritus of electrical engineer at Stanford University, pointed to the work done by security technology firm Cryptography Research Inc. in identifying the threat of differential power analysis attacks as an example of the tangible value of ongoing research in the field.   "There are attacks yet to be found," Dickie said.   Whitfield Diffie, a visiting professor at the University of London's Royal Holloway College and a visiting scholar at Stanford, defined the first phase of cryptography's existence as the period between roughly 1915 when the first Enigma machine was created until the February 2005 release of the NSA's Suite B set of cryptographic algorithms. The application of secure computing only existed for about half of that roughly 90-year period, Diffie noted, suggesting that there is plenty of room for continued research.   Despite the gravity of the topic, the panelists found time for a few laughs. In a separate QA session held after the Cryptographers' Panel, Shamir added that he was not convinced that embedding cryptographic elements within semiconductors is the solution to the security issue.   "I'm not convinced that a security mechanism embedded on chips is going to make the situation much better," Shamir said, adding that a Trojan horse that makes it onto a computer is going to record keystrokes regardless of whether the security is in the hardware, the software, or both.   "My only hope is that the Russian Trojans on my computer and the Chinese Trojans on my computer will fight each other and block each other ," Shamir joked.      Dylan McGrath EE Times
  • 热度 13
    2011-3-18 12:33
    2056 次阅读|
    0 个评论
    Two months after an NSA official said there is no longer any such thing as "secure" computing, pioneers of the field of cryptography gathered for their annual panel discussion at the RSA Conference in San Francisco. A few months ago, Debora Plunkett director of the Information Assurance Directorate (IAD) at the U.S. National Security Agency (NSA), made headlines when she told attendees at a cyber security forum that there is "no such thing as 'secure' anymore."   What Plunkett meant, according to Dickie George, technical director of the NSA's IAD, is that there has been a paradigm shift in network and computer security: rather than focusing all efforts on keeping intruders out, the reality of today's world forces security teams to assume that adversaries can and do access their networks.   While keeping intruders out is still the primary objective, George said during the annual Cryptographers' Panel at the RSA Conference 2011 in San Francisco, monitoring today's networks requires keeping a vigilant eye out within for uncharacteristic or "inappropriate" behavior.   "If you assume they haven't been , you are setting yourself up for a shock," George said.   George and fellow panelists, including Ronald Rivest, the Viterbi professor of electrical engineering and computer science at MIT, said cryptography remains the best tool available for ensuring network security. But they noted that cryptography has its limitations.   "Cryptography provides the tools, but I think the problem we are facing is the rash of technology development," Rivest said. "We keep building fences, but the universe keeps growing."   Adi Shamir, professor of computer science at Israel's Weizmann Institute of Science, noted that the two biggest network security issues of the past year—the WikiLeaks controversy and the Stuxnet computer worm attack that reportedly damaged as many as one fifth of Iran's nuclear centrifuges—could not have been prevented with cryptography.   "It's interesting to me that the two biggest attacks of the last year had nothing to do with cryptography," Shamir said.   But though they acknowledged that cryptographer has its limitations, panelists—pioneers in field—also emphasized that ongoing cryptography research is still of great value.   Martin Hellman, professor emeritus of electrical engineer at Stanford University, pointed to the work done by security technology firm Cryptography Research Inc. in identifying the threat of differential power analysis attacks as an example of the tangible value of ongoing research in the field.   "There are attacks yet to be found," Dickie said.   Whitfield Diffie, a visiting professor at the University of London's Royal Holloway College and a visiting scholar at Stanford, defined the first phase of cryptography's existence as the period between roughly 1915 when the first Enigma machine was created until the February 2005 release of the NSA's Suite B set of cryptographic algorithms. The application of secure computing only existed for about half of that roughly 90-year period, Diffie noted, suggesting that there is plenty of room for continued research.   Despite the gravity of the topic, the panelists found time for a few laughs. In a separate QA session held after the Cryptographers' Panel, Shamir added that he was not convinced that embedding cryptographic elements within semiconductors is the solution to the security issue.   "I'm not convinced that a security mechanism embedded on chips is going to make the situation much better," Shamir said, adding that a Trojan horse that makes it onto a computer is going to record keystrokes regardless of whether the security is in the hardware, the software, or both.   "My only hope is that the Russian Trojans on my computer and the Chinese Trojans on my computer will fight each other and block each other ," Shamir joked.      Dylan McGrath EE Times
相关资源
  • 所需E币: 5
    时间: 2021-3-17 18:32
    大小: 617.32KB
    上传者: czdian2005
    密码编码学与网络安全(原版CryptographyandNetworkSecurity)
  • 所需E币: 3
    时间: 2019-12-24 23:05
    大小: 41.9KB
    上传者: 978461154_qq
    Abstract:SeveralapplicationsusetheMaximSHAiButton®tokensforeCash,vending,farecollection,anduserauthentication.Theyrequiretheuseofsecretstorecognizeauthentictokensandtosecuredataandmonetaryvaluesagainsttampering.Thesecurityofanentirecryptographicsystemrestswithitsabilitytoproperlygenerateandprotectitssecretsandchallenges.Thisapplicationnotedescribesmethodstogenerateworld-classcryptographicsecretsandchallenges.Italsodescribesthedevicesthatcanholdthosevalueswheretheyaresafefromattack,anddescribesschemeswheresecretsneverleavetheprotectedsiliconenvironmentatanytimeandareneversubjecttocompromise.Maxim>AppNotes>1-WireDevicesiButtonSecurityandAuthenticationKeywords:SHAiButton,SHA-1,secret,MAC,challenge,authentication,ecash,entropy,randomnumbers,cryptography,digitalsignatureMar08,2002APPLICATIONNOTE152SHAiButtonSecretsandChallengesAbstract:SeveralapplicationsusetheMaximSHAiButtontokensforeCash,vending,farecollection,anduserauthentication.Theyrequiretheuseofsecretstorecognizeauthentictokensandtosecuredataandmonetaryvaluesagainsttampering.Thesecurityofanentirecryptographicsystemrestswithitsabilitytoproperlygenerateandprotectitssecretsandchallenges.Thisapplicationnotedescribesmethodstogenerateworld-classcryptographicsecretsandchallenges.Italsodescribesthedevicesthatcan……
  • 所需E币: 4
    时间: 2019-12-24 23:05
    大小: 45.88KB
    上传者: wsu_w_hotmail.com
    Abstract:ThisdocumentshowshowMaxim'sDS1963SSHAiButton®canbeusedwithsmallmicrocontrollerstoprovidestrongencryptionandauthenticationofcontrolandstatusmessages,telemetry,orsensitiveprocesscontrolinformation.Forlowcostandlowoverhead,itprovidesnonvolatilememory,securesecretstorage,secretsharingandrotation,fastSHA-1padgeneration,andagloballyuniqueserialnumber.Asimplemicrocontrollerneedsonlyprovideasingleportpinandafewdozenlinesofcodetoattainqualitycryptographicsecurity.Maxim>AppNotes>1-WireDevicesiButtonSecurityandAuthenticationKeywords:cryptography,encryption,SHA,SHA-1,microcontroller,smallmessage,MAC,hash,one-way,authentication,security,randomFeb04,2002number,randomnumbers,pad,secret,coprocessor,rotation,DS1963S,DS1961S,DS2432APPLICATIONNOTE150SmallMessageEncryptionusingSHADevicesAbstract:ThisdocumentshowshowMaxim'sDS1963SSHAiButtoncanbeusedwithsmallmicrocontrollerstoprovidestrongencryptionandauthenticationofcontrolandstatusmessages,telemetry,orsensitiveprocesscontrolinformation.Forlowcostandlowoverhead,itprovidesnonvolatilememory,securesecretstorage,secretsharingandrotation,fastSHA-1padgeneration,andagloballyuniqueserialnumber.Asimplemic……
  • 所需E币: 4
    时间: 2019-12-24 17:09
    大小: 62.52KB
    上传者: rdg1993
    根据需要选择软件或硬件加密Maxim>DesignSupport>TechnicalDocuments>Tutorials>GeneralEngineeringTopics>APP5421Maxim>DesignSupport>TechnicalDocuments>Tutorials>Microcontrollers>APP5421Keywords:cryptography,algorithm,securemicro,cia,financialterminal,HSM,hardwaresecuritymodule,secretkey,ibutton,smartcardMay25,2012TUTORIAL5421CryptographyinSoftwareorHardware―ItDependsontheNeedMay25,2012Abstract:Asthelengthofsoftwarekeysincreasestoaccommodateevolvingneedsforgreatersecurity,sothemarketplacedemandsawidervarietyofcryptographicimplementations.Withrecentimprovementsincoredesignandfrequencyperformance,designersarenowa……