Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 14 Physical Tamper Resistance Hack a lock:

Similar presentations


Presentation on theme: "Chapter 14 Physical Tamper Resistance Hack a lock:"— Presentation transcript:

1 Chapter 14 Physical Tamper Resistance Hack a lock: http://www.schneier.com/blog/archives/2005/03/flaw_in_winkhau.html

2 Physically secure processors Portable tamper resistant IBM 4758 processors rated at governments highest level of security http://www.cl.cam.ac.uk/~rnc1/descrack/ Was found to be breakable see above. Need: To house crypto material is a secure housing

3 Crypto Processors Attack key entry Attack casing Attack potting material Memory remanence Cold enhances remanence

4 Classes of attackers Class 1 clever outsiders Class 2 knowledgeable insiders Class 3 funded organizations 4758 aimed at funded organizations

5 Medium Security Processors iButton Building access Computer access A “what you have” Dallas 5002 Uses bus encryption Clipper chip Encryption with way for government to decrypt all messages

6 Smart Cards Mobile phones Build “generic phones” Smart card contains user specific data Used by T-mobile Pay-TV subscriber cards, hotel door locks, telephone cards…

7 Architecture Most 8-bit processor ROM for program and other non changing data EEPROM for customer specific data RAM registers for processing data

8 Attacks on Smartcards Protocols Slow cards execution Physical tampering DirectTV attacks back http://www.securityfocus.com/news/143

9 Smartcards Not feasible for total protection Defense in depth Tamper resistance versus tamper evidence Stop loss Recent articles Kinko Fedex cards not SmartCard, but can recharge at Kiosk: http://www.eweek.com/article2/0,1895,1934424,00.asp http://www.eweek.com/article2/0,1895,1932824,00.asp

10 Magnetic stripe Current fraud: http://redtape.msnbc.com/2006/03/how_can _someone.html http://redtape.msnbc.com/2006/03/how_can _someone.html http://www.msnbc.msn.com/id/11731365/ This site has know how for many types of programming: http://www.makinterface.de/index_e.php3

11 What goes wrong Architectural errors Protecting the wrong thing Protocol failure Function creep

12 Discussion articles iButton actual uses What to protect with secure devices (ie 14.8 What should be protected)

13 Links to material Hardware Hacking chapter: http://www.grandideastudio.com/files/books/hpyn2e_chapter14.pdf Tamper resistance: http://www.cl.cam.ac.uk/~rja14/tamper.html Case Study Hack-a-Bike http://www.schneier.com/blog/archives/2005/02/hacking_a_bicyc_1.html Data remanence http://en.wikipedia.org/wiki/Data_remanence

14 Links to material Tamper resistance evaluation criteria http://en.wikipedia.org/wiki/FIPS_140 Ibutton http://www.maxim-ic.com/products/ibutton/ibuttons/index.cfm http://www.maxim-ic.com/products/ibutton/ Clipper chip http://www.epic.org/crypto/clipper/ http://www.webopedia.com/TERM/C/Clipper_chip.html

15 Links to Material Smart Card Security http://www.schneier.com/paper-smart-card-threats.html http://smartcard.nist.gov/ DirectTV fights back http://www.securityfocus.com/news/143 Tools http://www.hackerscatalog.com/Products/Smart_Cards/hardware_smartcards.html http://www.hackerscatalog.com/Products/Books/Credit_Finances_Scams/index.html


Download ppt "Chapter 14 Physical Tamper Resistance Hack a lock:"

Similar presentations


Ads by Google