CoolRunner-II CPLDs in Security. Quick Start Training Agenda Some Security Basics – Security – Cryptography CoolRunner-II Security Features Securing Things.

Slides:



Advertisements
Similar presentations
Lecture 5: Cryptographic Hashes
Advertisements

The Building Blocks: Send and Receive Operations
Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
CryptoBlaze: 8-Bit Security Microcontroller. Quick Start Training Agenda What is CryptoBlaze? KryptoKit GF(2 m ) Multiplier Customize CryptoBlaze Attacks.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Trusted Design In FPGAs Steve Trimberger Xilinx Research Labs.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.

Chapter 10  ATM 1 Automatic Teller Machines. Chapter 10  ATM 2 Automatic Teller Machines  “…one of the most influential technological innovations of.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Caesar Cipher a b c d e f g h I j k l m n o p q r s t u v w x y z b c d e f g h I j k l m n o p q r s t u v w x y z a shift of 1 c d e f g h I j k l m.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Encryption Methods By: Michael A. Scott
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Software design and development Marcus Hunt. Application and limits of procedural programming Procedural programming is a powerful language, typically.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
 WHAT IS ENCRYPTION :-  Encryption (Round) (cont.) :-  HISTORY OF DE :-  TYPES OF DATA ENCRYPTION :-  Decryption :-  Security And Cryptanalysis.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
CoolRunner™-II Advanced Features - II. Quick Start Training Advanced CoolRunner-II Techniques-II On the Fly Reconfiguration (OTF) – Understanding OTF.
CoolRunner ™ -II CPLDs in Cell Phone Security. Quick Start Training Overview Application Example: Cell Phone Security Feature Overview Shadow RAM based.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Lec. 5 : History of Cryptologic Research II
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture2 – Security and Protection Objectives, Attacks Rice ELEC 528/ COMP 538 Farinaz Koushanfar Spring 2009.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Lecture 2: Introduction to Cryptography
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Lecture 23 Symmetric Encryption
Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
DES: Data Encryption Standard
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Outline The basic authentication problem
Crypto in information security
Cryptography.
Presented by: Dr. Munam Ali Shah
Introduction Example: model train controller..
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Lecture 3: Symmetric Key Encryption
Security through Encryption
Protect Your Hardware from Hacking and Theft
Cryptography a Presentation Prepared by Vytautas Kondratas.
Mobile Phone Technology
Cryptology Design Fundamentals
Presentation transcript:

CoolRunner-II CPLDs in Security

Quick Start Training Agenda Some Security Basics – Security – Cryptography CoolRunner-II Security Features Securing Things with CoolRunner-II – Product theft – Intellectual property theft – A detailed example, securing an FPGA

Quick Start Training Security Basics Controlled Access – Voyager computer may be about it for true security Protocols – Less WHAT you do, more HOW you do it Most standards government developed/driven – NIST; NSA – International common criteria is new trend Military influenced Banking influenced Security attitude is critical

Quick Start Training Tamper Tamper evident – You fiddle with something, you leave tracks – Spyrus internet modules Temper resistant – Takes significant investment in time and money – Still, not impossible Tamper responsive - take action – Zero memory – Self destruct Tamper proof - mythical? Voyager computer? hmmm..

Quick Start Training A Basic Protocol Step 1: Sender places secret message into locked box Step 2: Attaches senders lock to one lock site on box Step 3: Sender transmits locked box to the receiver Step 4: Receiver attaches own lock & returns to sender Step 5: Sender sees receivers lock & removes senders lock Step 6: Sender re-sends box with only receivers lock Step 7: Receiver removes own lock and reads message Question: Where is the hole?

Quick Start Training Classic Protocol Attack Man in the Middle MiG version – Air Force jet flies over ground station transponder – Identify Friend or Foe (IFF) challenge occurs – Enemy aircraft records challenge and response – Knows correct response when challenged Used with b (laptop listener) Thief looking over shoulder at ATM for PIN Etc.

Quick Start Training Cryptography Ideas Long history going back to the ancients – Babylonians, Hebrews, Greeks, Romans, Chinese Lots of interest since WWI Concepts: confusion/diffusion (Shannon) Stream Ciphers Block Ciphers Big idea: protocols

Quick Start Training One Time Pad Plain TextKeyEncrypted Text Notes: # plain text bits equal # key bits Key must be random Key used only one time Perfect encryption if all steps followed

Quick Start Training Keep This in Mind

Quick Start Training CoolRunner-II Security What we have for security – Nonvolatility – Security protect bits Multiple bits – Reconfigurability Cracking CoolRunner-II – What will it take?

Quick Start Training Metal, Metal, Everywhere

Quick Start Training Cant Find Read Protect Bits

Quick Start Training CoolRunner-II Conceptual Idea Bits hidden here, somewhere...

Quick Start Training Cracking CoolRunner-II Security To readback you must: – Erase protect bits Cant get there with laser Must use charge pump Know where they are Issue correct subcommands Issue correct command sequence – Reverse the JEDEC file to get design Deeply buried protection resists tampering – Laser/electrical tampering locks down

Quick Start Training Additional CoolRunner-II Security Double Data Rate Operation – Data transactions less obvious DataGATE – Tamper response – Block I/O pin signals Power & Tempest attacks – Advanced state machines – CryptoBLAZE

Quick Start Training Securing an FPGA EPROM holds config file CPLD extracts bits CPLD delivers to FPGA Attacker can – Copy EPROM – Collect bitstream from FPGA Data input Classic Man in Middle attack FPGA* CoolRunner-II CPLD EPROM Data Control Address & Control Data * Non Virtex II, which has triple DES

Quick Start Training Trick #1 Encrypt EPROM Encrypt EPROM – Only be used with CoolRunner-II CPLD CPLD must decipher Attackers must catch data – Takes more time and is harder – Build hardware bit catcher If off by one bit, it wont work! FPGA* CoolRunner-II CPLD EPROM Data Control Address & Control Data

Quick Start Training CPLD Encryption D Q LFSR Clear Bits Encrypted Bits Basic idea: Stream Cipher; lots of them exist, this is a simple one Quality: Highly random within the repetition cycle Easy to build in CPLDs Lots of theory on building and using Also lots of theory on cracking them! You need to select the LFSR, then write code to encrypt the EPROM

Quick Start Training CPLD Encryption Continued Solution: Make things harder Fancier Stream Ciphers exist, we can make them, too!

Quick Start Training Trick #2 Hold Back Function Retain part of FPGA design in CPLD – Wont work without CPLD – Reverse eng. CPLD Typically control function – FPGA does data crunching and much control – CPLD does some, critical control FPGA* CoolRunner-II CPLD EPROM Data Control Address & Control Data

Quick Start Training Trick #3 Resist Blank EPROM Attack CPLD checks for blank EPROM Wont deliver FPGA stream unless – Multiple locations match internal compares Can take several actions – Do nothing – Deliver bogus bitstream – Erase the CPLD!* FPGA* CoolRunner-II CPLD EPROM Data Control Address & Control Data *details in cell phone theft design

Quick Start Training Summary CoolRunner-II Security is not perfect, but it is VERY GOOD! You can make designs substantially more expensive to reverse engineer These have been some ideas on how to use this capability, think up more of your own! See session on Cell Phone Theft & CryptoBLAZE See Security White Paper