[Cryptech Core] two presos

Joachim Strömbergson joachim at secworks.se
Mon Dec 29 13:34:02 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Aloha!

Peter Stuge wrote:
> Several free and/or open source projects making up various parts of 
> an FPGA toolchain are mentioned. fpgatools is not mentioned, and 
> fills a gap which is mentioned in the presentation.
> 
> The presented framework works today and allows Linux userspace to 
> mmap() across EIM into cores on a Novena.
> 
> https://balboa.is/ https://github.com/balboa-fpga/

Very interesting, thanks!


> Andy predicts that encryption implemented on an FPGA is vulnerable
> to a malicious FPGA vendor, because of the limited ways a particular 
> algorithm will fit onto the physical fabric.

Need to look at that. On operation level it is of course true that the
vendor knows and controls how a given operation is mapped onto the FPGA
fabric. But to know when the operation is part of an encryption
algorithm or not sounds harder.

It might be the case that all operations are vulnerable (I guess side
channel leakage) and has not been observed. But then we should probably
have seen more papers on how impossible it would be to implement things
like encryption on FPGAs. If the FPGA vendors were that evil. Wild
speculation this from my side though. Need to look at the preso.

- -- 
Med vänlig hälsning, Yours

Joachim Strömbergson - Alltid i harmonisk svängning.
========================================================================
 Joachim Strömbergson          Secworks AB          joachim at secworks.se
========================================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=W4tn
-----END PGP SIGNATURE-----



More information about the Core mailing list