On Sat, Jun 18, 2011 at 1:08 PM, slinky <[email protected]> wrote:
> ...
>  1. How can one ensure this blackbox device really isn't a Mallory?

completely reverse the software(firmware) and hardware.
  c.f. http://www.flylogic.net/blog/

there are convincing arguments even this is insufficient. :/


>  2. Are there techniques... to
>  reduce the impact of untrusted hardware, while still being able to
>  use the hw-accelerated capabilities?

if you knew exactly how the backdoor was implemented (such as software
only defect) you may have an avenue around it.

leaky hardware is leaky hardware, however.


> And if you know of any good papers around this subject,

look for entropy reduction in hw random sources and side channels in
implementation.

cryptographic quality hardware random sources are too long a tangent
for this reply. :)

good coverage of hardware side channels in cryptographic engineering
(ISBN 978-0-387-71816-3 / 978-1-4419-4417-7)

 "... Basics of Side-Channel Analysis.- Improved Techniques for
Side-Channel Analysis.- Electromagnetic Attacks and Countermeasures.-
Leakage from Montgomery Multiplication.- Randomized Exponentiation
Algorithms.- Microarchitectural Attacks and Countermeasures."

maybe someone on list has a relevant arXiv selection,...
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to