Raising the Bar for Hardware Security: Physical Layer Security in Standard CMOS

C. Rawlings
{"title":"Raising the Bar for Hardware Security: Physical Layer Security in Standard CMOS","authors":"C. Rawlings","doi":"10.1109/THS.2008.4534461","DOIUrl":null,"url":null,"abstract":"As the sophistication of attacks on secured systems extends to the international electronic borders, there exists an increased need for enhanced physical layer security in silicon in order to protect sensitive information such as encryption keys used in most security systems. With hardware security as one of the new primary requirements for many, if not most, system architectures, new questions are being asked of various memory technologies in order to prohibit the reverse engineering or break down of the overall system for the life of that security system, standard, and/or protocol. One of the most relevant questions to the topic of hardware security is, \"How physically secure is the underlying memory technology?\" Equally important is the question of securing sensitive encryption keys throughout the manufacturing process. These two hardware security factors are important since encryption is only as robust as the ability for any encryption based system to keep the encryption key hidden. A new embedded permanent memory technology based on a standard logic CMOS antifuse provides unprecedented physical layer security for security applications such as HDCP (High bandwidth Digital Content Protection) and AACS (Advanced Access Content System), both of which require unique encryption keys for each hardware device. While these are commercial security standards used to protect digital media in the consumer marketplace, the same principals apply to the public sector. A CMOS logic antifuse technology, developed and patented by Kilopass, when combined with a robust key distribution, tracking, and management system, tailored for semiconductor manufacturing, provides end-to-end security for sensitive encryption keys from the author or originator of the encryption key through to the end product.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":" 20","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Conference on Technologies for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2008.4534461","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

As the sophistication of attacks on secured systems extends to the international electronic borders, there exists an increased need for enhanced physical layer security in silicon in order to protect sensitive information such as encryption keys used in most security systems. With hardware security as one of the new primary requirements for many, if not most, system architectures, new questions are being asked of various memory technologies in order to prohibit the reverse engineering or break down of the overall system for the life of that security system, standard, and/or protocol. One of the most relevant questions to the topic of hardware security is, "How physically secure is the underlying memory technology?" Equally important is the question of securing sensitive encryption keys throughout the manufacturing process. These two hardware security factors are important since encryption is only as robust as the ability for any encryption based system to keep the encryption key hidden. A new embedded permanent memory technology based on a standard logic CMOS antifuse provides unprecedented physical layer security for security applications such as HDCP (High bandwidth Digital Content Protection) and AACS (Advanced Access Content System), both of which require unique encryption keys for each hardware device. While these are commercial security standards used to protect digital media in the consumer marketplace, the same principals apply to the public sector. A CMOS logic antifuse technology, developed and patented by Kilopass, when combined with a robust key distribution, tracking, and management system, tailored for semiconductor manufacturing, provides end-to-end security for sensitive encryption keys from the author or originator of the encryption key through to the end product.
提高硬件安全标准:标准CMOS中的物理层安全
随着对安全系统的攻击的复杂性扩展到国际电子边界,为了保护大多数安全系统中使用的敏感信息(如加密密钥),对硅中增强物理层安全性的需求日益增加。随着硬件安全性成为许多(如果不是大多数的话)系统架构新的主要需求之一,各种内存技术被提出了新的问题,以便在该安全系统、标准和/或协议的生命周期内禁止逆向工程或破坏整个系统。与硬件安全主题最相关的问题之一是,“底层内存技术的物理安全性如何?”同样重要的是在整个制造过程中保护敏感加密密钥的问题。这两个硬件安全因素很重要,因为加密的健壮性取决于任何基于加密的系统保持加密密钥隐藏的能力。一种基于标准逻辑CMOS反保险丝的新型嵌入式永久存储技术为HDCP(高带宽数字内容保护)和AACS(高级访问内容系统)等安全应用提供了前所未有的物理层安全性,这两种应用都需要每个硬件设备的唯一加密密钥。虽然这些是用于保护消费者市场中的数字媒体的商业安全标准,但同样的原则也适用于公共部门。Kilopass开发并获得专利的CMOS逻辑反熔丝技术,与专为半导体制造定制的强大密钥分发、跟踪和管理系统相结合,为敏感加密密钥从加密密钥的作者或发起者到最终产品提供端到端的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信