HOW CAN WE PROTECT OUR HARDWARE ??? HOW CAN OUR HARDWARE PROTECT ITSELF ???
1
Secure Hardware HOW CAN WE PROTECT OUR HARDWARE ??? HOW CAN OUR - - PowerPoint PPT Presentation
Secure Hardware HOW CAN WE PROTECT OUR HARDWARE ??? HOW CAN OUR HARDWARE PROTECT ITSELF ??? 1 OReilly 2 Trusted or Trustworthy? An object is trusted if and only if it operates as expected An object is trustworthy if and only if it is
HOW CAN WE PROTECT OUR HARDWARE ??? HOW CAN OUR HARDWARE PROTECT ITSELF ???
1
2
O’Reilly
3
4
What Do TPMs Do? (Trusted Computing)
compromised platform cannot lie about when interrogated.
hypervisors.
– Generate, store, and use symmetric and asymmetric keys – Key hierarchy – key encrypting keys, platform keys, endorsement keys, storage root keys – Key cache – Key migration – Key usage policy enforcement
systems they are in)
6 IBM Confidential
7
8
9
10
Because of the unknown order of the contents of the cumulative hash, you also need it to send you its log.
11
12
13
– Who are the attackers?
– What resources do they have? – What attacks are anticipated?
14
– notoriety – money – life and limb of others – a marketable identity – defeat of an enemy in wartime – control of
traffic?
15
Physical – it’s own enclosure – the enclosure of the system it’s in – a secure environment (inside the Pentagon) – inspection / human beings / dogs Logical / software – Encryption of sensitive material – Authentication of operators – Integrity of incoming commands and software – Integrity of on-board memory – Integrity of the bootstrap / factory initialization
16
– Increasingly important operations – In increasingly distributed environments – That are increasingly open
– We need to trust machines we cannot control – And to which motivated adversaries may have direct access
17
physical and logical attacks
program on the real thing, and a clever impersonator
devices, yet not break the security of the whole system
fast crypto box
18
number generation)
detection)
19
personalization
entertainment content
systems for defense, intelligence, justice
20
▪ Announced in September, 2003 ▪ Greatly improved performance ▪ PCI-X and network interface ▪ Same physical / logical security feature set as 4758 ▪ Certified FIPS 140-2 level 4
21
Proprietary pipelining hardware DES/TDES engine Modular math engine SHA-1 engine Hardware random number generator Active tamper-detection and response circuitry
CPU Time of day clock FLASH (4MB) DRAM (4MB) ROM (64KB) Proprietary memory interlock Battery-backed RAM (8KB) I/O (PCI, serial port) Tamper-responding membrane 266+MHz PowerPC SoC PCI/X, Ethernet 64MB ECC 16MB 1MB 128KB
New pipeline and crypto ASICs w/ much better performance (e.g. 50X in some cases)
22 20 January 2006
23 20 January 2006
24 20 January 2006
25 20 January 2006
26 20 January 2006
27
2019
28
procesing amongst parties that do not trust each other
data (kept encrypted)
requests (request encrypted, processing in secure coprocessor)
the results (transmission encrypted)
Solution Components
distributed results are based on automatically enforced contracts
confined within the secure coprocessor (IBM 4758) and is not
the coprocessor is always encrypted
biometrics
Agency 2
Auth/Enc (4758)
Agency 1
Auth/Enc (4758)
. . . . .
Law Enforcement
Auth/Enc (4758)
Airline 1
Auth/Enc (4758)Airport
Airline 2
Auth/Enc (4758)Law Enforcement
Auth/Enc (4758)
Railroad 1
Auth/Enc (4758)Railroad
secure matching in 4758 secure matching in 4758 secure matching in 4758 secure matching in 4758 secure matching in 4758 secure matching in 4758
Matchbox service
Auth/Enc (4758)
31 9/29/19
32 9/29/19
Ordinary snap-cap bottles
33 9/29/19
Tamper evident bottle caps ▪ alert the user to tampering ▪ require inspection (rely on humans for protection)
34 9/29/19
Child resistant medicine bottle caps resist opening by unauthorized users (children). Tamper resistance → device begins to protect itself
35 9/29/19
The PillSafe™ stacks drug tablets next to a stable chemical reactant that can destroy the drugs. Attempts to force the mechanism or penetrate the bottle cause instant destruction of the medication. Tamper responding → device protects itself
See http://www.healthcarepackaging.com/archives/2007/03/futuristic_pill_container_zaps.php
36 9/29/19
Requirements are mainly cumulative, with a few exceptions
yours”)
37 9/29/19
– One does not actually see most devices interacted with – Most devices themselves have disappeared into systems (or onto chips) – This was still feasible when FIPS 140-1 was written – Still useful in some restricted environments (example: ATMs)
38 9/29/19
– Human being in Personnel – IBM as a microcode and operating system loader – An operating system as an application loader
39 9/29/19
enclosure (plus other features)
40 9/29/19
41 9/29/19
– Highest level achievable (much stronger than Level 3) – Module actively protects itself
– Level 4 specific features
– Very few Level 4 devices exist (almost all from IBM) – Level 4 devices may be deployed to untrusted environments
43
44
David Safford, IBM Research
45 9/29/19
Common false assumptions: “By using a certified product/library, added components themselves become certified” “By layering multiple certified components, the whole system becomes certified” Reality: Unless very carefully applied, composing two evaluations can actually result in LESS security than each component had on its own