Top Banner
Paul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography, Moore’s Law, and Hardware Foundations for Security © 2015 Cryptography Research, Inc. Some technologies described are protected under issued and/or pending US and/or international patents. All trademarks are the property of their respective owners. The information contained in this presentation is provided for educational purposes only, and is provided without any guarantee or warranty whatsoever, and does not necessarily represent official opinions of Cryptography Research, Rambus, or their partners.
21

Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Mar 31, 2018

Download

Documents

ledieu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Paul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015

Cryptography, Moore’s Law, and Hardware Foundations for Security

© 2015 Cryptography Research, Inc. Some technologies described are protected under issued and/or pending US and/or international patents. All trademarks are the property of their respective owners. The information contained in this presentation is provided for educational purposes only, and is provided without any guarantee or warranty whatsoever, and does not necessarily represent official opinions of Cryptography Research, Rambus, or their partners.

Page 2: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

2 ©2015 Rambus Cryptography Research Division

Background •  Started Cryptography Research 1995 ◦  Business model evolved (Consulting + R&D à IP licensing à solutions) ◦  Organic growth, no outside investors thru acquisition by Rambus in 2011 ($342.5M)

•  Selected projects: ◦  SSL v3.0 / TLS: Co-authored security protocol ◦  Timing attacks; Differential power analysis: Side channel attacks & countermeasures ◦  Deep Crack: Hardware with a custom SoC to break DES ◦  ValiCert: Co-founded start-up (IPO in 2001, acquired 2003) ◦  CryptoFirewall Cores: Tamper-resistant cores to stop video piracy & counterfeiting ◦  BD+: Renewable security solution in Blu-ray ◦  Vidity (SCSA): Security for a new video distribution format (just launched) ◦  Cryptography Research Fund for Students: $1M fund w/ IACR to support students ◦  CryptoManager: Leading ASIC security solution (incl. on-chip cores, infrastructure)

Page 3: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

3 ©2015 Rambus Cryptography Research Division

Changing Device Security Constraints

•  Security used to be limited by computing power •  More computing power enables much stronger algorithms ◦  Example of 3DES: 3X computation = 256X strength vs. brute force

Page 4: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

… but Something is Very Wrong

•  Increasing breaches at all levels

•  Within two years, 90% of all IT networks will have an IoT-based security breach (source: IDC)

•  What happens if we have 50B connected devices by 2020?

Sources: DataBreaches.net, IdTheftCentre

latest

2014

2013

2012

Page 5: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

5 ©2015 Rambus Cryptography Research Division

Computing & Security Trends

More Devices

PC

Network

Phones

Auto- motive

Gaming

Tablets

IoT

More Valuable Data More Complexity

#  Line

s  of  C

ode

#  Tran

sistors  

Moore's  LawMoore’s Law

# T

ran

sac

tion

s

# L

ine

s o

f Co

de

Breaches cloud

ID

payments DRM IP

passwords

More Vulnerabilities More Targets More Attacker Reward

Page 6: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

6 ©2015 Rambus Cryptography Research Division

What Emerges as Complexity Increases?

N

2N

Lin

es

of c

od

e

(LO

C)

•  If defect density is constant per element, odds of zero flaws squares (20% à 4%)

•  Reality is worse: ◦  Defects reflect interactions (4th power) ◦  Defect densities tend to increase

8 elements: 28 interactions

4 elements: 6 interactions

Page 7: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

7 ©2015 Rambus Cryptography Research Division

Collapsed in 1967, created awareness of “fracture critical components”

Silver Bridge on U.S. 35 in Ohio: Built 1924 Image from model of bridge, courtesy of NIST

How many “fracture-critical” elements are in a typical IoT device? •  Bits of DRAM (non-ECC) •  Bits of flash/storage •  CPU logic •  Support logic •  Software •  Infrastructure …

~10 billion (1010) today…

In 10 years ~1 trillion (1012)

Page 8: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

8 ©2015 Rambus Cryptography Research Division

Security & Fractals

Individual bugs are “obvious” – when we stare directly at them Overall risks are “obvious” too – if we look for them

Page 9: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

9 ©2015 Rambus Cryptography Research Division

Insecurity is an emergent property.

•  Our ability to understand simple elements often creates a false impression that we understand the complex system

00401880 push ebp 00401881 mov ebp,esp 00401889 push 0 0040188B call 004019b0 00401890 add esp,4 00401893 jmp 004018d1 00401898 push eax 00401899 call 004018e0 0040189E add esp,4

Transistor

Processor,SoC

Machine Language

Operating System

Network

“Secure” Services

Page 10: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Incorrect Assumptions: Two SoC Examples

•  Assumption: Attackers only see the binary input/output data

•  Reality: Power & RF measurements show tiny correlations to individual gates -- that compromise keys from large, busy SoCs

•  Assumption: Software will be bug-free

•  Reality: Current designs are 1-3 exploits from total breach, with overwhelming likelihood of vulnerabilities

Defect Densities Side Channels

App

O/S

TEE 3

1 2

Attacker

T = 87488

Pro

b.

de

nsity

Power signal amplitude at time T=87488

Signal Amplitude

Register bit 7 =1 Register bit 7 =0

~9B chips/year made with countermeasures we license

Page 11: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

11 ©2015 Rambus Cryptography Research Division

Four Properties for Solutions to Succeed

Hardware-based Deployable additively

Hardware is the only layer where we know how to build reliable security

boundaries

Addresses infrastructure

Legacy designs can’t be abandoned, but are too complex to retrofit

Solutions that must address both in-device capabilities and manufacturing/lifecycle

Broadly positive ROI

All stakeholders must benefit, and benefits must not depend on ubiquity

Page 12: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Perimeters Grow in a single security perimeter

Traditional approach for security enhancements in CPUs, OSes…

Failure is likely + catastrophic

Many small security perimeters, e.g. for each use case

Small, survivable failures

Serbian ammunition storage facility Black Hills Ordnance Depot

Add additional partitions

Page 13: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

13 ©2015 Rambus Cryptography Research Division

Solving the problem •  Software security is not scalable ◦  No hope of eliminating bugs in existing software

◦  Macro situation is getting worse, not better ◦  CPU modes (TrustZone, Ring 0) haven’t helped

despite decades of trying

•  Separate chips/modules only work for a small subset of use cases (but can be great) ◦  Costly; distant from where security is needed

•  Secure ‘on-SoC’ logic blocks ◦  On the SoC with intra-chip security perimeter

◦  Isolated from main CPUs, SoC fabric, DRAM, …

App

O/S

TEE

On-SoC secure HW

3

1 2

Attacker

Page 14: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

On-Die Security Modules •  Why are on-chip security solutions particularly important? ◦  Integration enables major security advantages ◦  10X-100X cheaper to manufacture

◦  = Far greater potential reach than separate chips/modules (despite complex economics of certification)

•  Challenges are solvable, e.g.: ◦  Analog countermeasures à digital countermeasures

◦  NVM à OTP ◦  Appliance-to-core secure tunnels & multi-stage perso allow factories to be untrusted

◦  Third-party IP vendors can address chipmakers’ lack of security expertise

•  Harnessing Moore’s Law ◦  Moore’s Law helps security: On-die transistor prices fall

•  Separate modules don’t benefit due to non-transistor costs (packaging, distribution…)

◦  Potential for many security modules per chip (like CPU proliferation) •  Specialization for payments, VPN, content protection, identification…

Page 15: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

15 ©2015 Rambus Cryptography Research Division

Cryptography Research Approach: CryptoManager Solution

CryptoManager Core protects keys, configuration, debug

settings, etc. throughout SoC

CryptoManager Infrastructure delivers and audits security transactions across

factories & data centers

Observation: Chipmakers required solutions for in-device security and also solutions for enabling infrastructure

Page 16: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Looking Ahead…

Page 17: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

17 ©2015 Rambus Cryptography Research Division

If we can’t control risk, complexity makes

products less valuable

Security Risks Limit Technology’s Value

Time

Bene

fit f

rom

fea

ture

s

Highest-value features get implemented first

Risk grows with complexity Ris

k fr

om c

ompl

exity

# t

rans

isto

rs (

com

plex

ity)

Valu

e (b

enef

it –

risk)

Moore’s Law

“Russian guard service reverts to typewriters after NSA leaks” -- The Guardian (July 11, 2013)

“Indian High Commission in London to use Typewriters following Snowden Expose” -- Authint Mail (Oct. 25, 2013)

Page 18: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

18 ©2015 Rambus Cryptography Research Division

Looking Ahead •  “May you live in interesting times …” ◦  Macro trend of worsening will continue for 3-5 years minimum ◦  Individual designs may fare much better/worse

•  Technology industry’s future depends on finding solutions ◦  Otherwise, security risks will erase net benefits from new technology

◦  Past analogies: safety (aviation, pharma), environment (manufacturing)

•  Security modules will play a leading role in managing risk

1995 Mercedes +

Page 19: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Thank You

Page 20: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

Number of New Threats Each Year (per data from Symantec)

1,000

10,000

100,000

1,000,000

10,000,000

100,000,000

1,000,000,000

2002 2003 2004 2005 2006 2007 2008 2009 2010

Note: Logarithmic scale

Page 21: Cryptography, Moore’s Law, and Hardware Foundations for ... · PDF filePaul Kocher Cryptography Research Division, Rambus Keynote Session ICMC 2015 November 5, 2015 Cryptography,

0.01

0.1

1

10 19

45

1948

1951

1954

1957

1960

1963

1966

1969

1972

1975

1978

1981

1984

1987

1990

1993

1996

1999

2002

2005

2008

Fatalities per 100M Passenger Miles (For scheduled service; excludes "unlawful interference" and USSR)

Note: Logarithmic scale