On Tue, 29 May 2012 13:24:09 -0400, Dieter BSD wrote:
So I'm skimming through

http://it.slashdot.org/story/12/05/28/1454222/backdoor-found-in-china-made-us-military-chip
and find:

"These secure FPGAs contain a heavily obfuscated hardware crypto-engine, with lots of techniques to obstruct DPA (deliberately unstable clocks,"


This "news item" is full of misreprentations, feramongering and factual errors.

 the facts :
* The claims are about the Actel/Microsemi A3P family of FPGA,
that I use since 2009 at least. So I know a bit about them.
Sue me if I'm a long time Actel fanboy, you'll however find
fanboys for every manufacturer, particularly when they invest
thousands in their HW and SW.
* the security researcher found ways to extract locking keys.
In one of his attempts in 2009, he "de-capped" the chip and sent laser
pulses to given regions to force localised errors.
Actel did not foresee this fault injection technique, that's sure.
And since then, he enhanced his technique. Fair. That's his job.
* Actel also messed with its security infrastructure and ships factory keys
hidden in JTAG files. Or something like that. That's a failure.
* So yes, security of the A3P devices is not as high as they wish.
No system is perfect, plus, given the price, it's still a fair
achievement. Add a few digits if you want chips made for/by the NSA.

 What is wrong :
* my Actel chips are made in Taiwan and Korea. They are consumer and industrial
grade. The space and military grades are quite different.
* The fab could not "swap" the masks. They cost millions to create and create right.
Don't attribute to malice what can be explained by incompetence.
* The "backdoor" was known and even if badly documented, it is a system
of double keys that I have found by analysing documentation and asking on comp.arch.fpga. Hint : it's not a backdoor. It's a 2-level security system. However where
Actel failed is that they have the same key for all devices.
So it's not a backdoor. It's a security failure, but some people prefer
to spin this to benefit their agenda.
* The story is more complex than that BUT the headlines completely mess
with what is actually at stake. And not stuxnet for FPGA is realistic...
* Seriously, the author seeks renewal of his job's grants.
All he has to do is wave vague claims and link them to the fears of the day... Chinese malice ? check. Dangerous application that are at "risk" ? check. Fear attracts more money than company failures to get a security model right. * Slashdot is publishing more and more fallacies and sensationaling news
 these last weeks, they make me sick.

I'm so upset by all this brouhaha that I consider writing an article for
a local security magazine to sort the facts and the bad "journalism".


Reliance on claims on slashdot or in PR pieces has always been dangerous. However, don't get me wrong : being able to "crack" the A3P is also a good thing. Consider all those aftermarket chips sold on eBay at a buck for a pound because they were "locked" in factory. Crack them, and use them for something better
than gathering dust.
I've always been mad at Actel because once a chip is locked, it's bricked unless you know the unlocking code. Other CPUs (Microchip) don't allow to readback but if you brick it with the lock on, you can still flush it and conserve money. Actel's chips are much more expensive though so any chance of "brick" is
a monetary danger.

Ok, i calm down now.

_______________________________________________
Open-graphics mailing list
[email protected]
http://lists.duskglow.com/mailman/listinfo/open-graphics
List service provided by Duskglow Consulting, LLC (www.duskglow.com)

Reply via email to