At 10:32 AM -0700 9/13/99, Eugene Leitl wrote:
>Why don't you just erase flash when a pressure change (hull breach) is
>detected. Using double-walled hull, to look for shortcuts.  You can
>also couple this to light detection, and whatnot.
>
>Andreas Bogk writes:
> > Russell Nelson <[EMAIL PROTECTED]> writes:
> >
> > >  > There's some question about how hard it will be to design
> > >  > hardware that will be DPA-resistant for different
> > >  > algorithms.
> > > Big on-chip caps.  Lithium batteries.  Tamper-resistant housings.
>[...]

A sophisticated attacker could measure the pressure in each 
compartment and work in a pressurized, darkened room.

One thought I had is to include a circuit on chip (perhaps duplicated 
in several places) that would monitor on-chip supply voltage and keep 
the program from executing sensitive code for some period if dV/dt 
were too high.  If the cap or Li battery were disconnected, the 
circuit would see continuous fluctuations and shut the processor 
down. A accidental power glitch would only cause a short delay in 
execution.

If an attacker can get to the chip and disable these power monitor 
circuits, he can probably also put a logic analyzer on the memory 
lines and extract the key that way.

Arnold Reinhold

Reply via email to