Standardizing Bad Cryptographic Practice A teardown of the IEEE P1735 standard for protecting electronic-design intellectual property
نویسندگان
چکیده
We provide an analysis of IEEE standard P1735, which describes methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP. We find a surprising number of cryptographic mistakes in the standard. In the most egregious cases, these mistakes enable attack vectors that allow us to recover the entire underlying plaintext IP. Some of these attack vectors are well-known, e.g. padding-oracle attacks. Others are new, and are made possible by the need to support the typical uses of the underlying IP; in particular, the need for commercial system-on-chip (SoC) tools to synthesize multiple pieces of IP into a fully specified chip design and to provide syntax errors. We exploit these mistakes in a variety of ways, leveraging a commercial SoC tool as a black-box oracle. In addition to being able to recover entire plaintext IP, we show how to produce standard-compliant ciphertexts of IP that have been modified to include targeted hardware Trojans. For example, IP that correctly implements the AES block cipher on all but one (arbitrary) plaintext that induces the block cipher to return the secret key. We outline a number of other attacks that the standard allows, including on the cryptographic mechanism for IP licensing. Unfortunately, we show that obvious “quick fixes” to the standard (and the tools that support it) do not stop all of our attacks. This suggests that the standard requires a significant overhaul, and that IP-authors using P1735 encryption should consider themselves at risk.
منابع مشابه
مدیریت دیجیتالی حقوق مالکیت ادبی و هنری
With the emergence and development of ICT especially the Internet, intellectual property law have been facing new challenges. Electronic tools and other new ICTs have provided new and unique opportunities for humanity to produce and duplicate works; however, they have also increased the potential of the breach of authors' rights which is not comparable to the tools used in the few past decades....
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملCryptographic Sha - 1 Hash Implementation for Intellectual Property ( Ip ) Protection Flavia
CRYPTOGRAPHIC SHA-1 HASH IMPLEMENTATION FOR INTELLECTUAL PROPERTY (IP) PROTECTION FLAVIA LEITAO, DR. AMEETA G. SINAI AMONKAR 1. ME (Microelectronics), Electronics and Telecommunication Engineering, Goa College of Engineering, Farmagudi, Goa 2. Head of the department, Electronics and Telecommunication Engineering, Goa College of Engineering, Farmagudi, Goa Accepted Date: 27/02/2014 ; Published D...
متن کاملبررسی ایجاد بستر مناسب حمایت از طب سنتی در نظام حقوق مالکیت فکری
In recent decades, the protection of traditional medicine under the intellectual property system has been the subject of many efforts that was made by international community and especially less developed countries which are rich in this field. Since this knowledge has the unique characteristics and other current legal systems of intellectual property can not protect all aspects of it, the worl...
متن کاملFpga Fingerprinting Techniques for Protecting Intellectual Property
As CAD tools and semiconductor technology improvements increase market opportunities for reusable hardware components, it becomes more important to produce techniques for protecting intellectual property rights. This work presents a method of fingerprinting an FPGA design component, so that products in the field can be used to identify both the component designer as well as the customer of reco...
متن کامل