What Is Public Key Authentication? - Renesas e
Download
Report
Transcript What Is Public Key Authentication? - Renesas e
ID 930L: Board ID Embedded Security Lab
Renesas Electronics America Inc.
Shotaro Saito
Application Engineer
14 October 2010
© 2010 Renesas Electronics America Inc. All rights reserved.
Version: 1.1
Mr. Shotaro Saito
Application Engineer, Secure MCU
Responsible for development environment
of secure MCU product line.
Developed the Board ID demo kit with
SH version of the Board ID Security Stack
PREVIOUS EXPERIENCE:
10+ years of embedded programming and development
tools support at Yokogawa Electric Corp.
3+ years of secure MCU application development with
biometrics enabled Smartcard
2
© 2010 Renesas Electronics America Inc.
All rights reserved.
Renesas Technology and Solution Portfolio
Microcontrollers
& Microprocessors
#1 Market share
worldwide *
ASIC, ASSP
& Memory
Advanced and
proven technologies
Solutions
for
Innovation
Analog and
Power Devices
#1 Market share
in low-voltage
MOSFET**
* MCU: 31% revenue
basis from Gartner
"Semiconductor
Applications Worldwide
Annual Market Share:
Database" 25
March 2010
** Power MOSFET: 17.1%
on unit basis from
Marketing Eye 2009
(17.1% on unit basis).
3
© 2010 Renesas Electronics America Inc.
All rights reserved.
Renesas Technology and Solution Portfolio
Microcontrollers
& Microprocessors
#1 Market share
worldwide *
Solutions
for
Innovation
ASIC, ASSP
& Memory
Advanced and
proven technologies
Analog and
Power Devices
#1 Market share
in low-voltage
MOSFET**
* MCU: 31% revenue
basis from Gartner
"Semiconductor
Applications Worldwide
Annual Market Share:
Database" 25
March 2010
** Power MOSFET: 17.1%
on unit basis from
Marketing Eye 2009
(17.1% on unit basis).
4
© 2010 Renesas Electronics America Inc.
All rights reserved.
Microcontroller and Microprocessor Line-up
Superscalar, MMU, Multimedia
High Performance CPU, Low Power
High Performance CPU, FPU, DSC
Up to 1200 DMIPS, 45, 65 & 90nm process
Video and audio processing on Linux
Server, Industrial & Automotive
Up to 500 DMIPS, 150 & 90nm process
600uA/MHz, 1.5 uA standby
Medical, Automotive & Industrial
Up to 165 DMIPS, 90nm process
500uA/MHz, 2.5 uA standby
Ethernet, CAN, USB, Motor Control, TFT Display
Legacy Cores
Next-generation migration to RX
General Purpose
Up to 10 DMIPS, 130nm process
350 uA/MHz, 1uA standby
Capacitive touch
5
© 2010 Renesas Electronics America Inc.
All rights reserved.
Ultra Low Power
Embedded Security
Up to 25 DMIPS, 150nm process Up to 25 DMIPS, 180, 90nm process
190 uA/MHz, 0.3uA standby
1mA/MHz, 100uA standby
Application-specific integration Crypto engine, Hardware security
Innovation
Contents Providers
Cloud
CD Player
Phonograph
Attack
Portable
Media
Player
VCR
6
© 2010 Renesas Electronics America Inc.
All rights reserved.
DVD
Blu-Ray
Our Secure MCU Solution
Renesas provides you practical secure MCU solutions for “Cloud
Age” of embedded products. The Board ID is very flexible
solution for retrofitting to your existing design and integrating
to your new robust design.
I’ll
Nohack
way!it
7
© 2010 Renesas Electronics America Inc.
All rights reserved.
Agenda
Quick Test
Embedded systems security overview
Public key authentication for embedded systems
Lab session
Setup
Use case tryouts
Setting up the authentication parameters
Porting the authentication firmware
Q&A
8
© 2010 Renesas Electronics America Inc.
All rights reserved.
Key Takeaways
By the end of this session you will be able to:
Think as hackers do (a little)
Identify the security threats against your design
Identify how the Board ID secures your products
9
© 2010 Renesas Electronics America Inc.
All rights reserved.
Quick Test
I change my password at least every three months
Company policy forces me to do so but I never change ones for my personal
accounts even my banking accounts
My passwords consist of at least ten characters including
upper-case letters, numbers and symbols
And it is written on a Post-it and attached on my LCD monitor
I always lock my PC when I leave my cubicle/office
But going to bathroom is an exception
I know how SSL works during my online shopping
And I believe any online shopping site with SSL is safe for shopping
I always read terms and conditions / EULA before I ‘agree’
And you click ‘agree’ button for “Death and Repudiation” license…
I always check all doors and windows before I leave home
And just in case for my kids, I leave the key under the door mat
If you say ‘yes’ for more than three times, you are ready to
go forward
10
© 2010 Renesas Electronics America Inc.
All rights reserved.
Embedded Systems Security Overview
11
© 2010 Renesas Electronics America Inc.
All rights reserved.
Secure Mindset And Trusted Entity
I think, therefore I am
No security exists unless you are aware of it
Being paranoid – the first step
Don’t trust even your colleagues
“Being skeptical” is the key = Hacker’s mentality
Nothing is too extreme to secure your system (but it costs)
Defining the security perimeter
Don’t design a vault with unbreakable padlock without reinforced
drywall
PLM (Product life-cycle management) with proper security measures
Trusted Entities
A chain of trust (Security is a process, not a product)
– From device to enclosure, supply chain and sales channel
– Key generation, insertion and management
12
© 2010 Renesas Electronics America Inc.
All rights reserved.
Security Threats And Countermeasures
Clone and counterfeit products – Anti Cloning
Mandate physical existence of the Board ID for proper operation
Any system without proper key pairs will be rejected
Genuine yet unauthorized products (1) – Anti Cloning
Overproducing – Order for 10K units: 50K units in the market
– Restrict the number of products with Board ID devices
Genuine yet unauthorized products (2) – Secure Tracking
Importing/Exporting genuine peripheral from cheaper region
– Authentication with country (region) code
– ‘Oversea’ peripherals won’t work with local host system
Overuse or misuse of product – Usage control
Restrict the number of use in the product lifecycle
Hacking – IP protection
Escalation – Purchase low-end product, hack and make it a high-end
– Authentication with ‘feature’ code
13
© 2010 Renesas Electronics America Inc.
All rights reserved.
Public Key Authentication for Embedded System
14
© 2010 Renesas Electronics America Inc.
All rights reserved.
What Is Public Key Authentication?
Bases on asymmetrical cryptography (i.e. RSA)
Utilizes a pair of ‘public’ and ‘private’ key
Digital signature = Encrypting a message digest with a
private key
Signature verification = Decrypting the signature with a
public key
Authentication
if (Decrypted signature == original message digest)
{
Ownership of the private key is proven;
}
15
© 2010 Renesas Electronics America Inc.
All rights reserved.
Why Public Key, Not Symmetrical Key?
Sharing identical key everywhere = higher risk
Compromise one = compromise all
Key delivery is always an issue
All entities must be secured
In the real world
Symmetrical cryptography (i.e. AES) is used as a part of SSL
– Asymmetrical cryptography for exchanging session keys
– AES for stream cipher
For low-cost consumables
– Where cost for security does matter
16
© 2010 Renesas Electronics America Inc.
All rights reserved.
Pros And Cons of Public Key Authentication
Pros
No key distribution issue
No need to hold ‘secret’ key on the host side
Proven technology with daily on-line transaction (SSL)
Cons
Computing power intensive = more resource requirements
– Embedded hardware accelerator
Requires infrastructure (PKI)
– Trusted entity (Avnet) takes care of it
However, the Board ID solution eliminate all cons
17
© 2010 Renesas Electronics America Inc.
All rights reserved.
Lab Session with The Demo Kit
18
© 2010 Renesas Electronics America Inc.
All rights reserved.
Start the Lab
Keep your dice turned to the section
of the lab you are on. (Instructions
are provided in the lab handout)
Please refer to the Lab Handout and let’s get started!
19
© 2010 Renesas Electronics America Inc.
All rights reserved.
Checking Progress
We are using the dice to keep track of where everyone is in
the lab. Make sure to update it as you change sections.
When done with the lab, your dice will have the 6 pointing
up as shown here.
20
© 2010 Renesas Electronics America Inc.
All rights reserved.
Questions?
21
© 2010 Renesas Electronics America Inc.
All rights reserved.
Innovation
Contents Providers
Cloud
CD Player
Phonograph
Attack
Portable
Media
Player
VCR
22
© 2010 Renesas Electronics America Inc.
All rights reserved.
DVD
Blu-Ray
Thank You!
23
© 2010 Renesas Electronics America Inc.
All rights reserved.
Renesas Electronics America Inc.