
A secure cryptoprocessor is a dedicated
computer-on-a-chip or
microprocessor
A microprocessor is a computer processor (computing), processor for which the data processing logic and control is included on a single integrated circuit (IC), or a small number of ICs. The microprocessor contains the arithmetic, logic, a ...
for carrying out
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
operations, embedded in a packaging with multiple
physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
measures, which give it a degree of
tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.
The purpose of a secure cryptoprocessor is to act as the keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures.
Examples
A
hardware security module (HSM) contains one or more secure cryptoprocessor
chips.
These devices are high grade secure cryptoprocessors used with enterprise servers. A hardware security module can have multiple levels of physical security with a single-chip cryptoprocessor as its most secure component. The cryptoprocessor does not reveal keys or executable instructions on a bus, except in encrypted form, and zeros keys by attempts at probing or scanning. The crypto chip(s) may also be
potted in the hardware security module with other processors and memory chips that store and process encrypted data. Any attempt to remove the potting will cause the keys in the crypto chip to be zeroed. A hardware security module may also be part of a computer (for example an
ATM) that operates inside a locked safe to deter theft, substitution, and tampering.
Modern
smartcards are probably the most widely deployed form of secure cryptoprocessor, although more complex and versatile secure cryptoprocessors are widely deployed in systems such as
Automated teller machine
An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, funds transfers, balance inquiries or account ...
s, TV
set-top box
A set-top box (STB), also known as a cable converter box, cable box, receiver, or simply box, and historically television decoder or a converter, is an information appliance device that generally contains a Tuner (radio)#Television, TV tuner inpu ...
es, military applications, and high-security portable communication equipment. Some secure cryptoprocessors can even run general-purpose operating systems such as
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
inside their security boundary. Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus. This is known as
bus encryption. Data processed by a cryptoprocessor is also frequently encrypted.
The
Trusted Platform Module
A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot process starts from a trusted combination of hardware and software and storing disk encryption keys.
...
(TPM) is an implementation of a secure cryptoprocessor that brings the notion of
trusted computing to ordinary
PCs by enabling a
secure environment. Present TPM implementations focus on providing a tamper-proof boot environment, and persistent and volatile storage encryption.
Security chips for embedded systems are also available that provide the same level of physical protection for keys and other secret material as a smartcard processor or TPM but in a smaller, less complex and less expensive package. They are often referred to as cryptographic
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
devices and are used to authenticate peripherals, accessories and/or consumables. Like TPMs, they are usually turnkey integrated circuits intended to be embedded in a system, usually soldered to a PC board.
Features
Security measures used in secure cryptoprocessors:
* Tamper-detecting and
tamper-evident
Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings, or other techniques may be tamper indicating.
Tampering
Tampering involves the deliberate altering or adulterat ...
containment.
* Conductive shield layers in the chip that prevent reading of internal signals.
* Controlled execution to prevent timing delays from revealing any secret information.
* Automatic
zeroization of secrets in the event of tampering.
*
Chain of trust boot-loader which authenticates the operating system before loading it.
* Chain of trust operating system which authenticates application software before loading it.
* Hardware-based
capability registers, implementing a one-way
privilege separation
Privilege may refer to:
Arts and entertainment
* Privilege (film), ''Privilege'' (film), a 1967 film directed by Peter Watkins
* Privilege (Ivor Cutler album), ''Privilege'' (Ivor Cutler album), 1983
* Privilege (Television Personalities album ...
model.
Degree of security
Secure cryptoprocessors, while useful, are not invulnerable to attack, particularly for well-equipped and determined opponents (e.g. a government intelligence agency) who are willing to expend enough resources on the project.
One attack on a secure cryptoprocessor targeted the
IBM 4758. A team at the University of Cambridge reported the successful extraction of secret information from an IBM 4758, using a combination of mathematics, and special-purpose
codebreaking hardware. However, this attack was not practical in real-world systems because it required the attacker to have full access to all API functions of the device. Normal and recommended practices use the integral access control system to split authority so that no one person could mount the attack.
While the vulnerability they exploited was a flaw in the software loaded on the 4758, and not the architecture of the 4758 itself, their attack serves as a reminder that a security system is only as secure as its weakest link: the strong link of the 4758 hardware was rendered useless by flaws in the design and specification of the software loaded on it.
Smartcards are significantly more vulnerable, as they are more open to physical attack. Additionally, hardware backdoors can undermine security in smartcards and other cryptoprocessors unless investment is made in anti-backdoor design methods.
In the case of
full disk encryption applications, especially when implemented without a
boot PIN, a cryptoprocessor would not be secure against a
cold boot attack if
data remanence could be exploited to dump
memory
Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembe ...
contents after the
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
has retrieved the cryptographic
keys from its
TPM.
However, if all of the sensitive data is stored only in cryptoprocessor memory and not in external storage, and the cryptoprocessor is designed to be unable to reveal keys or decrypted or unencrypted data on chip
bonding pads or
solder bumps, then such protected data would be accessible only by probing the cryptoprocessor chip after removing any packaging and metal shielding layers from the cryptoprocessor chip. This would require both physical possession of the device as well as skills and equipment beyond that of most technical personnel.
Other attack methods involve carefully analyzing the timing of various operations that might vary depending on the secret value or mapping the current consumption versus time to identify differences in the way that '0' bits are handled internally vs. '1' bits. Or the attacker may apply temperature extremes, excessively high or low clock frequencies or supply voltage that exceeds the specifications in order to induce a fault. The internal design of the cryptoprocessor can be tailored to prevent these attacks.
Some secure cryptoprocessors contain
dual processor cores and generate inaccessible encryption keys when needed so that even if the circuitry is reverse engineered, it will not reveal any keys that are necessary to securely decrypt software booted from encrypted flash memory or communicated between cores.
The first single-chip cryptoprocessor design was for
copy protection
Copy protection, also known as content protection, copy prevention and copy restriction, is any measure to enforce copyright by preventing the reproduction of software, films, music, and other media.
Copy protection is most commonly found on vid ...
of personal computer software (see US Patent 4,168,396, Sept 18, 1979) and was inspired by Bill Gates's
Open Letter to Hobbyists.
History
The
hardware security module (HSM), a type of secure cryptoprocessor,
was invented by
Egyptian-American engineer
Mohamed M. Atalla,
in 1972.
He invented a high security module dubbed the "Atalla Box" which encrypted
PIN and
ATM messages, and protected offline devices with an un-guessable PIN-generating key.
In 1972, he filed a
patent
A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling discl ...
for the device.
He founded
Atalla Corporation (now
Utimaco Atalla) that year,
and commercialized the "Atalla Box" the following year,
officially as the Identikey system.
It was a
card reader and
customer identification system, consisting of a
card reader console, two customer
PIN pads, intelligent controller and built-in electronic interface package.
It allowed the customer to type in a secret code, which is transformed by the device, using a
microprocessor
A microprocessor is a computer processor (computing), processor for which the data processing logic and control is included on a single integrated circuit (IC), or a small number of ICs. The microprocessor contains the arithmetic, logic, a ...
, into another code for the teller.
During a
transaction, the customer's
account number was read by the card reader.
It was a success, and led to the wide use of high security modules.
Fearful that Atalla would dominate the market, banks and
credit card companies began working on an international standard in the 1970s.
The
IBM 3624, launched in the late 1970s, adopted a similar PIN verification process to the earlier Atalla system.
Atalla was an early competitor to
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
in the banking security market.
At the National Association of Mutual Savings Banks (NAMSB) conference in January 1976, Atalla unveiled an upgrade to its Identikey system, called the Interchange Identikey. It added the capabilities of
processing online transactions and dealing with
network security. Designed with the focus of taking
bank transactions online
In computer technology and telecommunications, online indicates a state of connectivity, and offline indicates a disconnected state. In modern terminology, this usually refers to an Internet connection, but (especially when expressed as "on lin ...
, the Identikey system was extended to shared-facility operations. It was consistent and compatible with various
switching networks, and was capable of resetting itself electronically to any one of 64,000 irreversible
nonlinear algorithms
In mathematics and computer science, an algorithm () is a finite sequence of mathematically rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for per ...
as directed by
card data information. The Interchange Identikey device was released in March 1976.
Later in 1979, Atalla introduced the first
network security processor (NSP).
Atalla's HSM products protect 250million
card transactions every day as of 2013,
and secure the majority of the world's ATM transactions as of 2014.
See also
*
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
*
Crypto-shredding
*
FIPS 140-2
*
Hardware acceleration
**
SSL/TLS accelerator
*
Hardware security modules
*
Security engineering
*
Smart card
A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit card-sized card with an Embedded system, embedded integrated circuit (IC) chip. Many smart ...
*
Trusted Computing
*
Trusted Platform Module
A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot process starts from a trusted combination of hardware and software and storing disk encryption keys.
...
*
Secure Enclave
*
Titan M
References
Further reading
*
Ross Anderson, Mike Bond, Jolyon Clulow and Sergei Skorobogatov, Cryptographic Processors — A Survey, April 2005
(PDF). This is not a survey of cryptographic processors; it is a survey of relevant security issues.
* Robert M. Best, US Paten
4,278,837 July 14, 1981
* R. Elbaz, et al., Hardware Engines for Bus Encryption — A Survey, 200
(PDF)
* David Lie, Execute Only Memory
.
Extracting a 3DES key from an IBM 4758* J. D. Tygar and Bennet Yee, ''A System for Using Physically Secure Coprocessors''
{{CPU technologies
Cryptographic hardware
Cryptanalytic devices
Arab inventions
Egyptian inventions