Russell Nelson <[EMAIL PROTECTED]> writes:

>  > There's some question about how hard it will be to design
>  > hardware that will be DPA-resistant for different
>  > algorithms.
> Big on-chip caps.  Lithium batteries.  Tamper-resistant housings.

The problem is that the caps probably have to be so large that
disabling them will be easy even if you don't have access to chip
analysis hardware. Lithium batteries are even easier to disable.

> That's what Dallas Semiconductor uses for its 1-Wire devices,
> including the famous Java ring.  It works to protect data, but not

I suggest to cut one up and look at it. Of course it is still physical
manipulation, which makes it more difficult than DPA is right now,
but it's not the answer.

> You could also superglue the chip to something very hard, so that you
> can't probe the chip without getting the cover off, and if you try,
> you destroy the chip trying.

There are solvents that remove superglue.

Andreas

-- 
"Niemand hat die Absicht, eine Firewall einzurichten"
  -- Peter Berlich <[EMAIL PROTECTED]>, dasr

Reply via email to