Software Hardware Binding with Quiddikey

Similar documents
Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

PUF Physical Unclonable Functions

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

LatticeXP2 Configuration Encryption and Security Usage Guide

Offline HW/SW Authentication for Reconfigurable Platforms

Secure Storage. Lost Laptops

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Logically Reconfigurable PUFs: Memory-Based Secure Key Storage

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Pre-tested System-on-Chip Design. Accelerates PLD Development

More Secure, Less Costly IoT Edge Node Security Provisioning

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

Reviving smart card analysis

Trusted Platforms for Homeland Security

CryptoFirewall Technology Introduction

Using RFID Technology to Stop Counterfeiting

Atmel s Self-Programming Flash Microcontrollers

SHE Secure Hardware Extension

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors

Hardware Intrinsic Security to Protect Value in the Mobile Market

Hardware Security Modules for Protecting Embedded Systems

Cryptographic Rights Management of FPGA Intellectual Property Cores

Innovative Secure Boot System (SBS) with a smartcard.

True Identity solution

BroadSAFE Enhanced IP Phone Networks

Anti-Counterfeiting with Hardware Intrinsic Security

Secure Network Communications FIPS Non Proprietary Security Policy

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS

Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1

Serial port interface for microcontroller embedded into integrated power meter

CHASE Survey on 6 Most Important Topics in Hardware Security

Automatic Drive Locking: Securing Digital Content Storage in the Digital Home

Preventing Piracy and Reverse Engineering of SRAM FPGAs Bitstream

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Hardware Trojans Detection Methods Julien FRANCQ

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ

Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software

NVM memory: A Critical Design Consideration for IoT Applications

OMAP platform security features

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

Secure USB Flash Drive. Biometric & Professional Drives

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview

Pulse Secure, LLC. January 9, 2015

SecureD Technical Overview

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

DATA MASKING A WHITE PAPER BY K2VIEW. ABSTRACT K2VIEW DATA MASKING

SecureDoc Disk Encryption Cryptographic Engine

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

TPM Key Backup and Recovery. For Trusted Platforms

SkyRecon Cryptographic Module (SCM)

Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

EMC Symmetrix Data at Rest Encryption

Smart Card: The Computer in Your Wallet

DesignWare IP for IoT SoC Designs

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

NOTICE SOFTWARE END USER LICENSE AGREEMENT

Industry 4.0: Cyber-Security Challenges on the Horizon

Software Piracy Overview of Anti-Tampering Technologies. Scott Baeder Sr. Architect Cadence Design Systems

EEM870 Embedded System and Experiment Lecture 1: SoC Design Overview

EDA385 Embedded Systems Design. Advanced Course

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Self-Encrypting Hard Disk Drives in the Data Center

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE

XTREMIO DATA AT REST ENCRYPTION

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

SierraVMI Sizing Guide

Dashlane Security Whitepaper

How To Fix An Lmx9838 Bluetooth Serial Port Module With Bluetooth (Bluetooth 2) From A Bluetooth Bluetooth 4.2 Device With A Bluembee 2.2 Module

ES_LPC4357/53/37/33. Errata sheet LPC4357/53/37/33. Document information

Firmware security features in HP Compaq business notebooks

M-Shield mobile security technology

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

Software Licensing in Virtual Environments. Managing the Terms of Software Use in Virtualized Systems

MovieLabs Specification for Enhanced Content Protection Version 1.0

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Management of VMware ESXi. on HP ProLiant Servers

Server Scalability and High Availability

Windows BitLocker Drive Encryption Step-by-Step Guide

A brief on Two-Factor Authentication

Secure Key Management Architecture Against Sensor-node Fabrication Attacks

Veeam Cloud Connect. Version 8.0. Administrator Guide

1. Memory technology & Hierarchy

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

Hardware Protection. Redefined.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

USB Portable Storage Device: Security Problem Definition Summary

Secure Cloud Storage and Computing Using Reconfigurable Hardware

Transcription:

Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life

Software-Hardware Binding solutions are typically required for Flash-based systems in which a processor executes software, stored in external Flash memory that is being transferred to RAM memory before being executed. In these systems, software can easily be spied upon and illegally copied to another equivalent processor if no appropriate protection is applied. This attack is particularly feared in the software licensing and gaming industry where software or game publishers need to protect distributed content from being illegally copied or transferred to illegitimate devices without the appropriate ownership rights. One well-known strategy to protect against such attacks, also called secure node-locking, is to encrypt the software with a device specific key and to store the software in non-volatile memory in encrypted form. This allows to protect it against copying as well as to keep it confidential. In order to decrypt the software before executing it, the device needs to store the corresponding encryption key in a safe way. Storing secrets safely on chip either requires secure memory such as secure EEPROM or other costly non-volatile elements such as hidden OTP bits or hidden fuses. The keys stored in this way are not device specific and as soon as one of them leaks due to an attack, the software can be decrypted, re-encrypted to any desired key and copied onto any other device holding such a key. In addition to this, this attack allows reverse-engineering of the software such that the intellectual property on which it is based becomes exposed. From an economic point of view, solutions based on embedded non-volatile memory put often a very heavy burden on the bill of material in high-volume applications. Ideally software-hardware binding solutions avoid these cloning attacks and specifically lock the encrypted software to a unique device such that it cannot execute on any other, even equivalent, platform. This is precisely what is achieved by the use of Intrinsic-ID s Quiddikey. Based on Quiddikey, a software image is bound to a specific device using its intrinsic security elements hidden in the hardware and a revolutionary approach based on a secure implementation of Physically Unclonable Functions called Hardware Intrinsic Security. This can be achieved with device unique random keys as well as with a global protection key. There is no need for on-chip secure nonvolatile memory and the costs for implementation and integration are low since this solution only uses standard components ad logic.

How it works Decryption without storing keys Quiddikey is the sole and unique security solution in the market which allows to dynamically reconstruct the on-chip secret key used for secure file and software decryption without ever storing that key. This means that the key is not present on the device when it is powered off, but generated on-the-fly Hardware Intrinsic Security every time it is needed. It defeats the most advanced invasive hardware attacks on the key itself by simply not storing it. Hardware Intrinsic Security Instead of storing the key in tamper-resistant non-volatile memory (typically secure EEPROM) or even hard-wiring it into the encryption core, Quiddikey allows for secure key extraction from unique physical properties of the underlying hardware. This new approach is called Hardware Intrinsic Security or HIS. The principle can best be described as biometrics for electronic devices and uses device unique random start-up values of an uninitialized SRAM block. Once in the device s lifetime, during Enrollment, the physical characteristics of the chip are extracted and turned into a so-called activation code. This activation code is not sensitive, unique for every device and is stored in the (possibly insecure) non-volatile memory of the chip or anywhere else in the system (where it is accessible to the chip). Every time the key is needed while the chip is in use, during Reconstruction, this device-unique data is measured again and combined with the activation code to reproduce the same deviceunique encryption key. Copying an activation code results in a non-functional device For applications in which the key is shared between a number of devices of the same family, Quiddikey also virtually allows to program a user selected key into the activation code, such that the reconstructed key results in a common key on multiple devices. This is particularly relevant when the software is encrypted ahead of time and sent to the device manufacturers in encrypted form. In both cases, the activation code remains unique per device and does not leak any information about the underlying key. Copying such an activation code from one device to another results in a non-functional device since the data extracted from the chips of another device do not match with this activation code and will result in the wrong key being reconstructed, thus protecting such systems against cloning and counterfeiting attacks simultaneously. Unique features

No key storage at power-off in the system Flexible key programming mechanism One die serves multiple customers Low implementation cost On-chip enrollment procedure Standard process steps and hardware components Standard manufacturing flow All technology nodes supported below 180nm The figure below provides an overview of how key reconstruction works in the field, once a device has been enrolled with the right key. Quiddikey integrates seamlessly into existing customer platforms and devices. Figure 1 This figure shows how the decryption key needed in step 3 is reconstructed from an SRAM reading in step 1 combined with an activation code reading in step 2 using the Quiddikey module. In step 3, the key is used by the AES decryption core to decrypt the encrypted software (step 4) stored in non-volatile memory (for example in Flash). In step 5, the decrypted software is executed by the CPU.

Deliverables and Requirements Hardware Quiddikey IP Functionality o Generates an activation code during enrollment o Reconstructs user selected key(s) or device unique random key(s) o Different key lengths possible Deliverables o Synthesized RTL (VHDL or Verilog), synchronous logic design o Hardware interface specifications o Test benches o Integration guidelines o Integration support Standalone or integrated AES encryption/decryption core Functionality o Receives a decryption key from Quiddikey HW module o Decrypts encrypted software on-chip o 128-bit or 256-bit key, ECB and CBC modes Deliverables o Synthesized RTL (VHDL or Verilog), synchronous logic design o Hardware interface specifications o Test benches o Integration guidelines o Integration support Customer Software Encryption tool Functionality o Receives user selected key or device unique random key o PC tool generates the encrypted version of customer software Deliverables o Software specification o Installation and user manuals o Interface specification

Wish to learn more about Software Hardware Binding with Quiddikey? Contact or visit us High Tech Campus 9 5656 AE Eindhoven The Netherlands Tel: +31 40 851 90 20 sales@intrinsic-id.com www.intrinsic-id.com Intrinsic-ID is the world-wide leader in security IP cores and applications based on Hardware Intrinsic Security, also referred to as Physical Unclonable Function (PUF). HIS enables a total protection of electronic data in the cloud and on other electronic systems. It prevents counterfeiting and cloning of systems, piracy of media content and software apps, theft of identity, software reverse engineering and financial losses by securing mobile payments. Intrinsic-ID was founded in 2008 as a spin-out of Royal Philips Electronics and has its headquarters in The Netherlands. Sales offices are located in: USA, Japan and Korea. Copyright 2014 Intrinsic-ID B.V. Intrinsic-ID, Quiddikey, Quiddicard, Hardware Intrinsic Security and other designated brands included herein are trademarks of Intrinsic-ID. All other trademarks are the property of their respective owners.