On Jun 3, 2010, at 10:39 AM, Sandy Harris wrote:

India recently forbade some Chinese companies from bidding on some
cell phone infrastructure projects, citing national security concerns...
The main devices to worry about are big infrastructure pieces --
telephone switches, big routers and the like. However, those are by no
means the only potential targets. Small home routers and various
embedded systems are others.

So, if one is building some sort of hardware that people may be
reluctant to buy because of security concerns, what does it take to
reassure them?...
Given the state of the art, there appears to be no way to get any assurance you can reasonably believe in. See http://cseweb.ucsd.edu/users/swanson/WACI-VI/docs/08_slides.pdf , full paper at http://www.usenix.org/events/leet08/tech/full_papers/king/king.pdf - for some work in this area: The authors took an open-source design for a SPARC chip and made some very small modifications to it. The resulting processor could not reasonably be distinguished from an unmodified one by any feasible testing, but renders any software protection you might use on the device completely ineffective against someone who knows how to trigger the hardware hacks (which can be done remotely). The only way you would know this stuff is there is by vetting the design - and detecting ~100 new lines of VHDL among 11,000, or 1000 new gates out of 1.8 million. And, of course this is a proof of concept, involving a very simple processor and no attempts to absolutely minimize the visibility of the changes.

People usually fall back on "well, get chips from multiple sources, they can't compromise them all". But that doesn't work here: If you don't know which chips are "good" and which are "traitors", you don't know there isn't a traitor in the very equipment you have to rely on. Further, obvious ideas like running extensive comparisons of outputs of chips from multiple sources don't work against attacks that only open the chip on a specific command. I suppose you could make sure every device that operates on sensitive data has redundant chips from multiple vendors and compare outputs - but then at the least you're vulnerable to a denial of service attack, which in some circumstances is almost as bad. And even if you do find that two chips disagree - which is the "bad" one? And if figure that out - you now know one "bad" source, but you have no evidence that the source of the other chip hasn't also "spiked" it in some different way. (The classic trick here is to have two attacks, and let one be "found" - after which the target *thinks* he's safe.)

The whole question of how to get trustworthy parts appears to be a huge issue in the US military/intelligence community these days. They're putting together consultations with academia and industry - and undoubtedly also funding all kinds of secret work as well. In the old days, it was practical for sensitive operations to build their own chips at vetted plants. Those days are gone - there are only a limited number of plants on the entire planet that can build state-of- the-art chips, the technology itself has been mastered by only a limited number of players, and the costs are immense even by military/ black funding standards.
                                                        -- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to