The Use of Reconfigurable Logic to Secure Data in Motion...

35
ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic to Secure Data in Motion & Data at Rest System Hardware & Software Integrity and more… Tactically Unbreakable COMSEC ( TUC) CONCEPTS INCORPORATED ADVANCED COMMUNICATIONS

Transcript of The Use of Reconfigurable Logic to Secure Data in Motion...

Page 1: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 1

The Use of Reconfigurable Logic to Secure Data in Motion & Data at Rest

System Hardware & Software Integrityand more…

Tactically Unbreakable COMSEC( TUC)

CONCEPTS INCORPORATEDADVANCED COMMUNICATIONS

Page 2: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 2

What TUC is

Page 3: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 3

Tactically Unbreakable COMSEC• What TUC is :

– A Reconfigurable Logic (RCL) based Protocol Hopping security structure• RCL is hardware circuits than can be “reprogrammed” on-the-fly• Protocol Hopping is a super-set of spread spectrum’s Frequency Hopping

– Single product solution for :• Data-at-Rest ( FISMA, DoD 8500 series)• Data-in-Motion ( HIPAA, ….)• Provider Remote Access (Customer Demand, HIPAA)

– Operates at OSI Level 2, transparent to Applications & Physical layers• Application independent – no program needs to be modified to use TUC• User independent – no operator action (or awareness ) needed to use

– Layered security protection (& QoS) for wired & wireless comms– A powerful enhancement to traditional software-only implementations of Multi

Level Security schemes– Cheap & easy enough to put in EVERY Device/Form Factor, be it laptops,

computer nets, PDAs, WLANs, etc.

Page 4: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 4

How TUC works

Page 5: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 5

Tactically Unbreakable COMSEC (TUC)Complexity Layering on a per packet basis

Transmitter’s TUC

Random Pad Bit

Insertion

Multi-Compression

Engine

Bit Bending Engine(Swaps/XORs/Rotates)

Multi-Encryption

Engine

Message Length

XOR

802.11 InputExample Packet of User Data

Routed to

802.11

Receiver’s TUC

Message Length

XOR

Random Pad Bit Removal

DeCom-pression Engine

Bit De-Bending Engine

Multi-Decryption

Engine

802.11 OutputOriginal Packet of User Data

Multi-Encryption SchemesMulti-Compression

Bit Bending Variants

Inserted Pad bits

Move ECC

XOR bits

Invert Bits

Interleave bits

Rotate inSub-groups

Rotate Bits

RepositionSub-groups

Data Swaps

Page 6: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 6

Hardware vs. Software Execution Speeds

SoftwareEncryption

Software implementations bog down the host processors and severely limit the speed of the channel that can be protected

Anybody think software will keep up with a 100 Megabit Ethernet?

TUC

TUC operates at full hardware circuit speeds -- because it IS hardware

Page 7: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 7

How TUC protects “Data in Motion”

Windows Comms ExampleOne Networking module:

- NDISAll Application data flows to/from

device drivers through NDIS

USB

PC Card

Other FormFactors

• All networking comms types covered– Wireless

• 802.11/Bluetooth/UWB/etc.– Wired

• 802.3 / Token Ring / others– Protocol insensitive

• IP - TCP/UDP/etc• ATM/SONET/etc.

TUC Driver

“Redirector” trapsdesignated packets

• Table Driven Packet designation by:– I/O Device ( 802.11 / Ethernet )– Packet Source/Destination Address– “Port type” ( ie 80=HTTP, etc)

Page 8: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 8

OSI Model – where TUC fitsOSI Layer Function Example

7 - Application Provide network access to user and system applications HTTP, SMTP, Telnet

6 - Presentation Data Transforms for Conversion, Compression and Encryption

MIME, Secure Socket Layer, XML. EBCDIC<->ASCII, MPEG

5 - Session Maintaining Connections, “Sessions” NetBIOS, Port Numbering , X.225

4 - Transport Insure data delivery end-to-end TCP, UDP, SPX and NetBEUI

3 - Network Data frame routing to logical address IP, IPX, Routers

2 - Data Link Physical addressing of transfer data units (frames) and error checking

X.25, AppleTalk, SDLC, PPP & SLIP, bridges

1 - Physical Connection, contention & flow control Cables, hubs & network adapters, RS-232, T1, 10BASE-T

Increased Security

TUC operates at the Data Link level with hooks into the Network Level. WHAT THIS MEANS : .

Applications are UNAWARE of TUC – no special coding needed !Applications & Utilities can’t by-pass TUC – can’t avoid security!

Page 9: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 9

TUCNet Data-in-Motion Demo

Page 10: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

TUC Module ( ED ) Reconfigurable Logic (RcL) Monitor

RcL Library Mgr.RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

All TUC applications include the TUC Core Module(each installer checks to see if Core already installed)

ACCI Confidential & Proprietary

Page 11: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

Fibre 802.16

ETHERNET

802.11

VPN

SatComNDIS W

rapper

TUCNet

(Comm

s I/O)TUC Module ( ED )

Reconfigurable Logic (RcL) MonitorRcL Library Mgr.

RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

ACCI Confidential & Proprietary

Page 12: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

TUCS

tore

( All

Stor

age

)

Hard Drives

CD / DVD

Floppy

NAS

SAN

USB Flash

Storage Drive Fibre 802.16

ETHERNET

802.11

VPN

SatComNDIS W

rapper

TUCNet

(Comm

s I/O)TUC Module ( ED )

Reconfigurable Logic (RcL) MonitorRcL Library Mgr.

RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

ACCI Confidential & Proprietary

Page 13: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 13

How TUC protects “Data at Rest”

Trap all Storage Read/Write Calls

TUC Driver

USB

PC Card

Other FormFactors

LINUX Storage ExampleTwo Main Entry Points:- Floppy (just floppies)

- SCSI (everything else)

• SCSI/FC drives• ATALib

– ATA (IDE) Drives

– ATAPI devices• CD/DVDs• USB

Page 14: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 14

TUCStore Data-at-Rest Demo

Page 15: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 15

Key Attributes of Data@Rest protection of Software and Data Integrity

1. On-FPGA PowerPC, physically and programmatically isolated2. All “Trusted Processor” programming, data & buffers isolated3. Digital Certificates and Public/Private keys are stored on

Trusted Processor TUC module – totally physically isolated 4. Hackers can not access or corrupt Digital Certificates or Keys

– Used to validate/certify all key Host software and data files– Used to validate, encrypt & digitally sign all protected files

3. Legal “Chain of Certification” can be tested & proven1. Certification for system software, data files and downloads2. Every item Digitally Signed, encrypted, & run time verified

2. TUC has an independent 3rd Party “Trusted Processor” that can not be corrupted or accessed by hackers

1. Encryption of storage files is the minimum requirement – but not nearly enough for true Data-at-Rest Security

Page 16: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 16

How TUC could protect software Programming Files on each power-up

On System Power Up : 1. TUC Hashs contents of ‘Verification File’ on Drive2. TUC reads “encrypted Hash value” from file3. TUC decrypts “encrypted Hash value” 4. TUC compares Hash values and verifies or rejects File Integrity

If Rejected, report error & STOP SYSTEM5. Start ‘Verification File’ program6. For each program in ‘Verification File’ list (all Vendor files):

• Compute Hash on file• Compare computed Hash to Hash stored in ‘Verification File’ table

7. If all Vendor files verified –> start Vendor software8. If any file corrupted -> report error & STOP SYSTEM

TUC

TUC certifies Verification File – then file certifies rest of software.Chain of certification legally traceable to TUC’s Digital Certificate

Page 17: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 17

How TUC could protect Data File Updates

On Running “Update Data Files” Routine: 1. TUC’s Update Data File program invoked by file update software2. TUC verifies Digital Certificate signature from file3. TUC reads Digital Certificate signed “encrypted Hash value” from file4. TUC decrypts “encrypted Hash value” 5. TUC compares Hash values and verifies or rejects File Integrity

If Rejected, report error & STOP SYSTEM

6. If Hash & Digital Certificate verified, start ‘Verify Data File’ program7. For each program in ‘Verify Data File’ internal list:

• Compute Hash on file• Compare computed Hash to Hash stored in ‘Data File’ internal table

8. If all Vendor files verified – Update new Verify Program HASH value and allow data file Update to disk

9. If any file corrupted - report error & STOP SYSTEM

TUC

TUC certifies Data Update files – then files loaded to disk.Chain of certification legally traceable to TUC’s Digital Certificate

Page 18: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 18

How TUC could protect software Updates

On Running “Update Software” Routine: 1. TUC’s Update Software program invoked by install software2. TUC verifies Digital Certificate signature from file3. TUC reads Digital Certificate signed “encrypted Hash value” from file4. TUC decrypts “encrypted Hash value” 5. TUC compares Hash values and verifies or rejects File Integrity.

If Rejected, report error & STOP SYSTEM6. If Hash & Digital Certificate verified, start ‘Verify Update File’ program7. For each program in ‘Verify Update File’ internal list:

• Compute Hash on file• Compare computed Hash to Hash stored in ‘Verification File’ internal table

8. If all Vendor files verified – Update new Verify Program HASH value and allow file Update to disk

9. If any file corrupted - report error & STOP SYSTEM

TUC

TUC certifies Update files – then files loaded to disk.Chain of certification legally traceable to TUC’s Digital Certificate

Page 19: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

TUCS

tore

( All

Stor

age

)

Hard Drives

CD / DVD

Floppy

NAS

SAN

USB Flash

Storage Drive Fibre 802.16

ETHERNET

802.11

VPN

SatComNDIS W

rapper

TUCNet

(Comm

s I/O)TUC Module ( ED )

Reconfigurable Logic (RcL) MonitorRcL Library Mgr.

RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

ACCI Confidential & Proprietary

Page 20: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

TUCS

tore

( All

Stor

age

)

Hard Drives

CD / DVD

Floppy

NAS

SAN

USB Flash

Storage Drive

T U C S a fe(P a s s w o rd s )

In v is ib leT U C S a fe

V is ib leU s e r

S a fe 1

V is ib leU s e r

S a fe n

Fibre 802.16

ETHERNET

802.11

VPN

SatComNDIS W

rapper

TUCNet

(Comm

s I/O)TUC Module ( ED )

Reconfigurable Logic (RcL) MonitorRcL Library Mgr.

RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

Page 21: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 21

TUCSafe Password Protection Demo

Page 22: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Single Security Sign On

T U C S a fe(P a s s w o rd s )

In v is ib leT U C S a fe

V is ib leU s e r

S a fe 1

V is ib leU s e r

S a fe n

TUC Module ( ED ) Reconfigurable Logic (RcL) Monitor

RcL Library Mgr.RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

ACCI Confidential & Proprietary

Any TUC application checks to see if TUCSafe installed :If Yes, it uses it ; If No, it loads a minimal version & uses it

Page 23: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

TUCS

tore

( All

Stor

age

)

Hard Drives

CD / DVD

Floppy

NAS

SAN

USB Flash

Storage Drive

T U C S a fe(P a s s w o rd s )

In v is ib leT U C S a fe

V is ib leU s e r

S a fe 1

V is ib leU s e r

S a fe n

Fibre 802.16

ETHERNET

802.11

VPN

SatComNDIS W

rapper

TUCNet

(Comm

s I/O)

VNX

Virtual Network Extension

NetworkCloud

TUC Client

EnterpriseNetwork

TUC Server

TUC Module ( ED ) Reconfigurable Logic (RcL) Monitor

RcL Library Mgr.RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

ACCI Confidential & Proprietary

Page 24: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Plug-In Environment

TUCS

tore

( All

Stor

age

)

Hard Drives

CD / DVD

Floppy

NAS

SAN

USB Flash

Storage Drive

T U C S a fe(P a s s w o rd s )

In v is ib leT U C S a fe

V is ib leU s e r

S a fe 1

V is ib leU s e r

S a fe n

Fibre 802.16

ETHERNET

802.11

VPN

SatComNDIS W

rapper

TUCNet

(Comm

s I/O)

VNX

Virtual Network Extension

NetworkCloud

TUC Client

EnterpriseNetwork

TUC Server Ap

p Ac

cele

rato

rHa

rdwa

re

Acce

lera

ted

Vide

o Fo

rmat

Conv

ersi

on

TUC Module ( ED ) Reconfigurable Logic (RcL) Monitor

RcL Library Mgr.RcL H/W MgrS/W TUC Mgr.

TUC API Mgr.Cryptologic Boundary

TUC Engine

API ManagerCrypto Engines

A / A / A Mgr.Digital Cert. Mgr.

ACCI Confidential & Proprietary

Page 25: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC Benefits

• Can use CAC, or any other client Authentication scheme, as TUC Authentication/Authorization scheme

• Single Security Sign-on – all TUC apps use TUCSafe• Single TUC Core module protects:

– Wired and Wireless communications– All data storage devices – disks/ USB flash drives/ external drives/

burnable CDs & DVDs / tapes/ floppies– All passwords / keys / account information / secure URLs

• Secure wireless up to Top Secret ( and SCI & above )• Wide Area secure wireless for :

– Multi mile coverage from single access point– Wireless VoIP phone service – Move personnel without IT/security burden– Secure laptop/remote log in from anywhere in the world– Disaster recovery/rapid mobility for entire command

ACCI Confidential & Proprietary

Page 26: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 26

Other TUC Advantages

• Future Proofing – can be as flexible as the threat– New/Updated encryption protocols can be added on-the-fly– Protocols enabled/disabled/restricted individually (in case of

protocol “break” or updated certification/decertification )

• “Trusted 3rd Party” processor to provide program/file integrity verification

• NSA Certifiable Red/Black separation on single FPGA• Instant “Zeroability” of encryption libraries, no

“reverse-engineering” of security chips possible• On-chip programming decryption, TUC configuration

programming can be stored as encrypted files• Complete interoperability of all TUC form factors –

PC-Cards, USB, PCI boards, software implementation

Page 27: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 27

Any Questions ?Contact information:Jonathan W. Ellis

Advanced Communications Concepts, Inc.8834 N. Capital of Texas Hwy, Suite 212

Austin, Texas 78750-6396(512) 275-6238 – office phone

(512) 275-6075 – office [email protected]

www.advcommcon.com

Page 28: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 28

Back Up Slides

Page 29: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 29

One Basic Circuit DesignMultiple Busses Supported;Common Software & Tools

PC Card PCI Express Compact FlashUSB

VMEPCI Card

Page 30: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 30

Spartan 3Config

FLASH

Spartan 3Cores for:

microBlaze RISC Encryption/PKI,TUC, Ethernet,

Serial Ports

USBwith

8051 +16k Ram Serial

EEPROM

TUC USB Prototype Board Components

PLL

SRAM32MB

Power Regulators

24MHzCrystal

5VInput

USB 2.0 Connector

4bitmux

Test LEDs

Test Switches

Test Jumpers

Page 31: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 31

Spartan3Config FLASH

Spartan 3Cores for:

microBlaze RISC Encryption/PKI,TUC, Ethernet,

Serial Ports

USB with

8051 + 16k Ram

8051 EEPROM

PLL

SRAM32MB

Power Regulators

24 MHzCrystal

5VInput

USB 2.0 Connector

4bitmux

Test LEDs

Test Switches

Test Jumpers

TUC USB Prototype Board Components

Page 32: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 32

S3 Config Flash4Mb

Virtex 4 fx-60450MHz PowerPC(2)Gb Ethernet MAC(2)

Cores for:Encryption/PKI, USB,

802.15.4, Ethernet, Serial Ports

Spartan3CardBus Core

MicroBlaze CPU

ProgramFlash8MB

25 PinConnectorJTAG,Serial, up to 17 I/Oor antennalines forUSB or

ZigBee; or 10/100/1000

Ethernet

68 Pin CardB

us or PCM

CIA

I/O PHYsUSB/802.15.4/Ethernet

V4 Config Flash32Mb

DDR64 MB

EEPROM16Kb

SRAM8 MB

Battery

PLL

PwrEEProm

TUC PC Card Components

Page 33: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 33

S3 Config Flash4Mb

Virtex 4 fx-60450MHz PowerPC(2)Gb Ethernet MAC(2)

Cores for:Encryption/PKI, USB,

802.15.4, Ethernet, Serial Ports

Spartan3CardBus Core

MicroBlaze CPU

ProgramFlash8MB

25 PinConnectorJTAG,Serial, up to 17 I/Oor antennalines forUSB or

ZigBee; or 10/100/1000

Ethernet

68 Pin CardB

us or PCM

CIA

I/O PHYsUSB/802.15.4/Ethernet

V4 Config Flash32Mb

DDR64 MB

EEPROM16Kb

SRAM

8 MB

Batteryfor

encryption keys

PLL

Pwr

EEProm

TUC PC Card Components

Page 34: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

ACCI Confidential & Proprietary 34

TUC PCcard H/W Block Diagram

Edge Comms ( USB / 802.15.4

Ethernet / Bluetooth / Wi-Fi )

Page 35: The Use of Reconfigurable Logic to Secure Data in Motion ...ewh.ieee.org/r5/central_texas/com_sp/meetings/TUC.pdf · ACCI Confidential & Proprietary 1 The Use of Reconfigurable Logic

TUC vs. Standard Attack Schemes

• Cipher Text only attack– Computational Complexity of hopping sequences/per packet rekeying

• Chosen Plaintext (w/compromised equipment)– Varying text treatments with changing protocols/compression/encryption

• Send same message a million times – get a million different outputs

• Correlation/linear/differential attacks– Varying text treatments with changing protocols/compression/encryption

• Man-in-the-Middle attack w/compromised equipment– Session Initialization Digital Signature/nonce and Client location authentication

• Micro Power/Radiation/Timing Analysis– Multiple concurrent chip operations (protocol/compression/encrypt/etc)

• Introduced fault cryptanalysis– Single chip operation of encrypted logic-mask based algorithms

• Captured Equipment protocol library monitoring– Multiple redundant, padded, Encrypted library entries per protocol

ACCI company Confidential & Proprietary