R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar - 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE Challenges.

Slides:



Advertisements
Similar presentations
IBM WebSphere Everyplace Access for Multiplatforms Managing the e-business Customer Experience.
Advertisements

18 July 2001 Work In Progress – Not for Publication 2001 ITRS Test Chapter ITRS Test ITWG Mike Rodgers Don Edenfeld.
July 12, 2012ITRS public conference – San Francisco1 More-than-Moore Roadmapping Update.
R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE.
R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar - 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE Working.
Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.
A Survey on Dual Interface and Multi Technology Cards ICMA – EXPO 2004 Prague, 17th – 20th October Presented by: Thies Janczek.
Computer Organization and Architecture
TO COMPUTERS WITH BASIC CONCEPTS Lecturer: Mohamed-Nur Hussein Abdullahi Hame WEEK 1 M. Sc in CSE (Daffodil International University)
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Terms 4 Definitions and Questions. Motherboard The main board of a computer, usually containing the circuitry for the central processing unit, keyboard,
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Cloud Usability Framework
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Mahesh Wagh Intel Corporation Member, PCIe Protocol Workgroup.
COMPONENTS OF THE SYSTEM UNIT
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
An Answer to the EC Expert Group on CLOUD Computing Keith G Jeffery Scientific Coordinator.
How to connect non IP devices into the UPnP™v1 fabric Vijay Dhingra Director of Standards Echelon Corp.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
SCSC 311 Information Systems: hardware and software.
Smart card security Nora Dabbous Security Technologies Department.
C5- IT Infrastructure and Emerging Technologies. Input – Process - Output 2 A computer  Takes data as input  Processes it  Outputs information CPU.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Presenter: PCLee. Semiconductor manufacturers aim at delivering high-quality new devices within shorter times in order to gain market shares.
Ivo Rosol, OKsystem Middleware.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Computer Organization & Assembly Language © by DR. M. Amer.
1 CALL 6 Key Action IV Introduction and Action Lines: IV.1.2, IV.2.1, IV.2.2, IV.2.4 Brussels, 16. Jan 2001 Colette Maloney European Commission.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
A Systematic Approach to the Design of Distributed Wearable Systems Urs Anliker, Jan Beutel, Matthias Dyer, Rolf Enzler, Paul Lukowicz Computer Engineering.
1 Objective 3.2 Smart Components and Systems Integration Georg Kelm, DG INFSO, Nanoelectronics InfoDay, Brussels, 11 October 2010 FP7 ICT Work Programme.
MANISH GUPTA. Presentation Outline Introduction Motivation Content Expected Impact Funding Schemes & Budget.
Software Engineering Chapter: Computer Aided Software Engineering 1 Chapter : Computer Aided Software Engineering.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
What’s Ahead for Embedded Software? (Wed) Gilsoo Kim
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Lesson 2 Component Overview Core Hardware Fundamentals.
Computer Architecture Chapter (5): Internal Memory
V irtual I nstrumentation Club. Official definition of Instrumentation from ISA (International Society of Automation)- A collection of Instruments and.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Programmable Logic Devices
Software Hardware refers to the physical devices of a computer system.
Similarities between Grid-enabled Medical and Engineering Applications
Algorithms for Big Data Delivery over the Internet of Things
Introduction to Computers
Ambient Intelligence.
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Protect Your Hardware from Hacking and Theft
Chapter 1 Introduction.
HIGH LEVEL SYNTHESIS.
COMS 361 Computer Organization
PLANNING A SECURE BASELINE INSTALLATION
Global megatrends (relevant for our business)
Central Topic: EMBEDDED SYSTEM
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar - 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE Challenges for future technology

R E S E T Roadmap for European research on Smartcard Technologies Pieter Hartel (University Twente) Eduard de Jong (Sun Microsystems) Challenges for future technology Integration in networked systems and environments

RESET IST Over view What is a trusted device How can it be integrated in a networked society

RESET IST What is not a trusted device? A slave to the reader a flat PC

RESET IST What is a trusted device? Requirements Guards your privacy Does what you want it to do Refuses to do what others want Challenges how to realise all three requirements How to integrate the device into a networked society

RESET IST The device guards your privacy Offers a high level of tamper resistance Multiple levels of defences Small trusted computing base within the card Discloses nothing when communicating Zero knowledge protocols Observers

RESET IST The device does what you want it to do Certifiable Tool scalability Expense Interacts directly with the user Keyboard & display Biometrics

RESET IST The device refuses to do what others want Embeded in a larger trusted device Finread Puts the problem somewhere else Prevents pin re-use

RESET IST How to realise all three Can we Prove that all three are satisfied? Measure to what extent they are satisfied? Is there an underlying theory?

RESET IST AmI component that must be integrated into society Communication speed & protocols Self powered Form factor Backwards compatibility New application areas Not to throw the baby out with the bath water...

R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE

R E S E T Roadmap for European research on Smartcard Technologies Dr. Ulrich BÜKER ORGA Systems GmbH RESET Workgroup Leader Challenges for future technology Systems Management

RESET IST Challenges Systems Management on-card Operating Systems Development Tools System Integration Card accepting devices Card and Device Management off-card

RESET IST Challenges Operating Systems Standard operating system features multi-application, multi-threading high-level memory management Smart Card specific OS features resource control management deadlock prevention / detection optimised resource usage Support of new communication models peer-to-peer TCP/IPv6

RESET IST Challenges Operating Systems Main Barriers variety of smart card hardware hinders the development of more sophisticated operating systems and programming languages enormous porting costs limited resources on smart card difficult adaption of state of the art IT techniques

RESET IST Challenges Development Tools Expressive programming languages integrating features of general-purpose languages support of smart card specific idioms domain-specific languages Modelling and Specification considered in the design of programming languages program proofs

RESET IST Challenges Development Tools Main challenges improve security improve certification process Formal Methods on different levels formal modelling formal verification program verification

RESET IST Challenges System Integration Main challenges integration of smart cards into information systems adaptation of software engineering results : middleware, integration tools management of smart cards and their content smart cards as application servers fundamental approach for defining the model

RESET IST Challenges System Integration Advanced smart card programmability and usage on-card and off-card frameworks extensible scalable dynamic management of card framework services middleware technologies scenario and application independent

RESET IST Challenges Card Accepting Devices Physical properties incorporation into everyday objects e.g. watch, ring secure CADs prevention of Trojan horses when entering data e.g. PIN, biometrics Data transmission wireless, secure channel between CAD and network high speed protocols to be supported

RESET IST Challenges Card / Device Management Standard architectures of CADs STIP, FinRead, GlobalPlatform common test suites needed security certification procedures Shared infrastructures between card and terminal less expensive increased trust management of different user credentials

R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE

R E S E T Roadmap for European research on Smartcard Technologies Jean-Paul THOMASSON STMicroelectronics Challenges for Secure System On Chip & System On Card

RESET IST The Age of TOTAL ACCESS Giving customers what they want in an Anytime, Anywhere World The ages of Reach and Push are marketing legacy Direct dialogue between the customer and the producer. Five Laws approach. Smart Card: the perfect enabling technology for the Age of Total Access

RESET IST Five Laws (1) Moores Law: the Number of Transistors on a chip doubles every 18 to 24 months. Metcalfes Law: the value of the network increases by the square of the number of users. Gilders Law: the communications bandwidth is growing faster than computing power by doubling every year.It will continue to do so for the next twenty-five years.

RESET IST Five Laws (2) Law of Storage: Infinite storage for an Infinite Amount of Information. For the network revolution to progress, storage and memory performance with corresponding decreases in cost must expand at a rate faster than in Moores law. Software Law: there is No Law. Software is hard, its more about framing human activity than about technology.

RESET IST The Challenge for Smart Card Rich Challenge Sec. SoC Reach Volume Features

RESET IST System On a Chip definition in year 2005 On a single chip co-location of sense, compute,control,store,communicate and actuate capabilities J. Borel Smart card ICs are Secure System On Chip

RESET IST System On a Chip definition LCDs Sensors Antennas Keyboards Loudsp. Power Management Memories µP, DSP Data Acquisition Power Actuators Information Processing (Super-integration) Multifunction Peripheral Line

RESET IST Developer requirements Developers require high density re-programmable NVM High end products today have more than 300Kbyte ROM ROM masking painful as: Cycle time for prototypes = weeks Bug free code more difficult with large system Advanced systems specifications keep moving Capability to download code over the air Possibility to add new functions (longer card life) Improved security (updated protections - safer card life) Limited cards inventory Few types inventory may cover product broad range Programs may be downloaded at test or personalisation Performances (speed & low power)

RESET IST The perfect NVM answer SRAM speed - DRAM / FLASH density Infinite retention – No fatigue Enough but not too much write energy Resistant to various perturbation Very low power No information leakage Simple standard CMOS process cost Simply does not exist !

RESET IST Economical side SMARTCARD MARKET Around 1% of semiconductor market Cannot justify specific technology development Today large density EEPROM are only used in smartcard Consumer type market Medium-High volume / very low price Industrial & reliable solution Must use a standard & proven NVM process (volume on commodity products)

RESET IST Technology side Speed: FRAM, MRAM, PCM Density: FLASH, PCM Retention: EEPROM & FLASH (not yet proven for others) Cycling: MRAM, PCM Overhead: FRAM, MRAM Power: FRAM (destructive read!) Scalability: FLASH, PCM Volume production: EEPROM & FLASH Process cost: no HV in MRAM/FRAM/PCM but material? Process compatibility: FRAM, MRAM, PCM can be added on standard CMOS No need for special high voltage devices

RESET IST Enhancing performances MOS Performance and leakage for low power. Production of Non-classical CMOS CMOS Integration of new Memory material. Starting material beyond 300mm Mask-making & cost Coordinated design tools & simulators to address chip and assembly issues.

RESET IST Design difficult challenges (HW& SW) Productivity to avoid exponentially increasing design costs. Re-use. Power management. Interference: resource-efficient communication and synchronisation. System-level integration of heterogeneous technologies Error tolerance relaxing for cost reduction ? Development of SOC test methodologies including for Security.(DFT DF Secure T)

RESET IST Conclusion We need strong and consistent R&D programs in technology challenging domains: architecture design and simulation semiconductor & heterogeneous technologies integration embedded software cost effective manufacturing security development and testing To bring to the market the necessary Innovations that will restore the Industry Growth and Profitability.

R E S E T Roadmap for European research on Smartcard Technologies RESET Seminar 3 April 2003 Brussels FROM SMART CARD TO TRUSTED PERSONAL DEVICE

R E S E T Roadmap for European research on Smartcard Technologies Challenges for future technology Smart Card Security Dr. Albert MÖDL Giesecke & Devrient GmbH

RESET IST Challenges Smart Card Security SECURE semiconductors for smart cards Enhanced subsystem security Card OS / software with high security level Ubiquitous security through communication and networks protocols Reliable and secure interplay with card accepting devices Enhanced security for the overall system

RESET IST Challenges: Secure Semiconductors Resistance to invasive and non-invasive attacks elaborate chip-architecture and design glue logic (randomization of the layout) bus scrambling (data are scrambled) constant-current mode Tamper resistance tamper-evident and removal-resistant coatings tamper detection mechanisms (sensors & actors) tamper response and zeroization circuitry

RESET IST Challenges: Secure Subsystems Secure card-embedded peripherals / subsystems e.g. modules, displays, keyboards, sensors secure packaging Tamper-resistant integration secure interconnection Secured interfacing security of internal bus for the various elements security of contact or contactless communication

RESET IST Challenges: Secure OS / Software Operating Systems with increased security secure multi-application OS secure software updates or loading of applets Development tools must be tailored to enhanced security concepts Secure implementation of advanced crypto algorithms Develop evaluation methods for security (e. g. modify CC methodologies for re-configurable architecture)

RESET IST Challenges: Secure Communication Smart card communication protocols secured with high-end cryptography high-performance and high-speed encryption and decryption processes secure interoperability Secure smart cards integration in networks enhanced security of smart cards in the Internet environment end-to-end security fault-tolerant protocols (accidental vs. induced faults)

RESET IST Challenges: Secure Interaction with Card Accepting Devices (CADs) Secure interconnection with ambient intelligent environments Secure man-machine interface Establish security and create trust for the CADs

RESET IST Challenges: Enhanced security for the overall smart card system Mutual interplay of the various security features of the smart card system hardware-software co-design operating system/protocols applications/testability/evaluation Security along the complete chain from semiconductor to card accepting device and background system Interdisciplinary collaboration necessary