Secure cryptoprocessor

related topics
{system, computer, user}
{law, state, case}
{war, force, army}
{math, number, function}
{game, team, player}

A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

The purpose of a secure cryptoprocessor is to act as the keystone of a security sub-system, eliminating the need to protect the rest of the sub-system with physical security measures.

Contents

Examples

Smartcards are probably the most widely deployed form of secure cryptoprocessor, although more complex and versatile secure cryptoprocessors are widely deployed in systems such as Automated teller machines, TV set-top boxes, military applications,[1] and high-security portable communication equipment. Some secure cryptoprocessors can even run general-purpose operating systems such as Linux inside their security boundary. Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus. This is known as bus encryption. Data processed by a cryptoprocessor is also frequently encrypted.

The Trusted Platform Module is an implementation of a secure cryptoprocessor that brings the notion of trusted computing to ordinary PCs by enabling a secure environment. While envisioned by some as being a method to make it much harder to illegally copy copyrighted software, present implementations tend to focus more on providing a tamper-proof boot environment and persistent and volatile storage encryption.

Hardware Security Modules contain one or more cryptoprocessors. These devices are high grade secure cryptoprocessors used with Enterprise servers. A hardware security module can have multiple levels of physical security with a single-chip cryptoprocessor as its most secure component. The cryptoprocessor does not reveal keys or executable instructions on a bus, except in encrypted form, and zeros keys by attempts at probing or scanning. The crypto chip(s) may also be potted in the hardware security module with other processors and memory chips that store and process encrypted data. Any attempt to remove the potting will cause the keys in the crypto chip to be zeroed. A hardware security module may also be part of a computer (for example an ATM) that operates inside a locked safe to deter theft, substitution, and tampering.

Features

Security measures used in secure cryptoprocessors:

  • Tamper-detecting and tamper-evident containment.
  • Automatic zeroization of secrets in the event of tampering.
  • Internal battery backup.
  • Chain of trust boot-loader which authenticates the operating system before loading it.
  • Chain of trust operating system which authenticates application software before loading it.
  • Hardware-based capability registers, implementing a one-way privilege separation model.

Full article ▸

related documents
Session Layer
Burnt-in timecode
Data service unit
Atari Transputer Workstation
Frame (telecommunications)
Basic rate interface
Automatic callback
BESM
Sinclair ZX80
Apple Attachment Unit Interface
Motorola 56000
Multiple document interface
Virtual machine
Microsoft Groove
IBM 650
Scalable Coherent Interface
VESA Display Data Channel
Finger protocol
Control unit
Killer application
Hitachi 6309
Μ-law algorithm
Packet analyzer
Single UNIX Specification
Joint Tactical Information Distribution System
Broadcast domain
Fault management
Arcadia 2001
Internet Control Message Protocol
Amiga 1000