This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Secure cryptoprocessor" – news ·newspapers ·books ·scholar ·JSTOR(May 2016) (Learn how and when to remove this message) |
Asecure cryptoprocessor is a dedicatedcomputer-on-a-chip ormicroprocessor for carrying outcryptographic operations, embedded in a packaging with multiplephysical security measures, which give it a degree oftamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.
The purpose of a secure cryptoprocessor is to act as the keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures.[1]
Ahardware security module (HSM) contains one or more secure cryptoprocessorchips.[2][3][4] These devices are high grade secure cryptoprocessors used with enterprise servers. A hardware security module can have multiple levels of physical security with a single-chip cryptoprocessor as its most secure component. The cryptoprocessor does not reveal keys or executable instructions on a bus, except in encrypted form, and zeros keys by attempts at probing or scanning. The crypto chip(s) may also bepotted in the hardware security module with other processors and memory chips that store and process encrypted data. Any attempt to remove the potting will cause the keys in the crypto chip to be zeroed. A hardware security module may also be part of a computer (for example anATM) that operates inside a locked safe to deter theft, substitution, and tampering.
Modernsmartcards are probably the most widely deployed form of secure cryptoprocessor, although more complex and versatile secure cryptoprocessors are widely deployed in systems such asAutomated teller machines, TVset-top boxes, military applications, and high-security portable communication equipment.[citation needed] Some secure cryptoprocessors can even run general-purpose operating systems such asLinux inside their security boundary. Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus. This is known asbus encryption. Data processed by a cryptoprocessor is also frequently encrypted.
TheTrusted Platform Module (TPM) is an implementation of a secure cryptoprocessor that brings the notion oftrusted computing to ordinaryPCs by enabling asecure environment.[citation needed] Present TPM implementations focus on providing a tamper-proof boot environment, and persistent and volatile storage encryption.
Security chips for embedded systems are also available that provide the same level of physical protection for keys and other secret material as a smartcard processor or TPM but in a smaller, less complex and less expensive package.[citation needed] They are often referred to as cryptographicauthentication devices and are used to authenticate peripherals, accessories and/or consumables. Like TPMs, they are usually turnkey integrated circuits intended to be embedded in a system, usually soldered to a PC board.
Security measures used in secure cryptoprocessors:
Secure cryptoprocessors, while useful, are not invulnerable to attack, particularly for well-equipped and determined opponents (e.g. a government intelligence agency) who are willing to expend enough resources on the project.[5][6]
One attack on a secure cryptoprocessor targeted theIBM 4758.[7] A team at the University of Cambridge reported the successful extraction of secret information from an IBM 4758, using a combination of mathematics, and special-purposecodebreaking hardware. However, this attack was not practical in real-world systems because it required the attacker to have full access to all API functions of the device. Normal and recommended practices use the integral access control system to split authority so that no one person could mount the attack.[citation needed]
While the vulnerability they exploited was a flaw in the software loaded on the 4758, and not the architecture of the 4758 itself, their attack serves as a reminder that a security system is only as secure as its weakest link: the strong link of the 4758 hardware was rendered useless by flaws in the design and specification of the software loaded on it.
Smartcards are significantly more vulnerable, as they are more open to physical attack. Additionally, hardware backdoors can undermine security in smartcards and other cryptoprocessors unless investment is made in anti-backdoor design methods.[8]
In the case offull disk encryption applications, especially when implemented without abootPIN, a cryptoprocessor would not be secure against acold boot attack[9] ifdata remanence could be exploited to dumpmemory contents after theoperating system has retrieved the cryptographickeys from itsTPM.
However, if all of the sensitive data is stored only in cryptoprocessor memory and not in external storage, and the cryptoprocessor is designed to be unable to reveal keys or decrypted or unencrypted data on chipbonding pads orsolder bumps, then such protected data would be accessible only by probing the cryptoprocessor chip after removing any packaging and metal shielding layers from the cryptoprocessor chip. This would require both physical possession of the device as well as skills and equipment beyond that of most technical personnel.
Other attack methods involve carefully analyzing the timing of various operations that might vary depending on the secret value or mapping the current consumption versus time to identify differences in the way that '0' bits are handled internally vs. '1' bits. Or the attacker may apply temperature extremes, excessively high or low clock frequencies or supply voltage that exceeds the specifications in order to induce a fault. The internal design of the cryptoprocessor can be tailored to prevent these attacks.
Some secure cryptoprocessors containdual processor cores and generate inaccessible encryption keys when needed so that even if the circuitry is reverse engineered, it will not reveal any keys that are necessary to securely decrypt software booted from encrypted flash memory or communicated between cores.[10]
The first single-chip cryptoprocessor design was forcopy protection of personal computer software (see US Patent 4,168,396, Sept 18, 1979) and was inspired by Bill Gates'sOpen Letter to Hobbyists.
Thehardware security module (HSM), a type of secure cryptoprocessor,[3][4] was invented byEgyptian-American engineerMohamed M. Atalla,[11] in 1972.[12] He invented a high security module dubbed the "Atalla Box" which encryptedPIN andATM messages, and protected offline devices with an un-guessable PIN-generating key.[13] In 1972, he filed apatent for the device.[14] He foundedAtalla Corporation (nowUtimaco Atalla) that year,[12] and commercialized the "Atalla Box" the following year,[13] officially as the Identikey system.[15] It was acard reader andcustomer identification system, consisting of acard reader console, two customerPIN pads, intelligent controller and built-in electronic interface package.[15] It allowed the customer to type in a secret code, which is transformed by the device, using amicroprocessor, into another code for the teller.[16] During atransaction, the customer'saccount number was read by the card reader.[15] It was a success, and led to the wide use of high security modules.[13]
Fearful that Atalla would dominate the market, banks andcredit card companies began working on an international standard in the 1970s.[13] TheIBM 3624, launched in the late 1970s, adopted a similar PIN verification process to the earlier Atalla system.[17] Atalla was an early competitor toIBM in the banking security market.[14][18]
At the National Association of Mutual Savings Banks (NAMSB) conference in January 1976, Atalla unveiled an upgrade to its Identikey system, called the Interchange Identikey. It added the capabilities ofprocessingonline transactions and dealing withnetwork security. Designed with the focus of takingbank transactionsonline, the Identikey system was extended to shared-facility operations. It was consistent and compatible with variousswitchingnetworks, and was capable of resetting itself electronically to any one of 64,000 irreversiblenonlinearalgorithms as directed bycard data information. The Interchange Identikey device was released in March 1976.[16] Later in 1979, Atalla introduced the firstnetwork security processor (NSP).[19] Atalla's HSM products protect 250 millioncard transactions every day as of 2013,[12] and secure the majority of the world's ATM transactions as of 2014.[11]
{{cite book}}: CS1 maint: others (link){{cite web}}: CS1 maint: multiple names: authors list (link)