[Cryptech Tech] Initial version of mkmif core done.
Joachim Strömbergson
joachim at secworks.se
Tue May 10 15:18:41 UTC 2016
Aloha!
The Cryptech Alpha board will sport a serial SRAM used to store the
master key which is used to wrap all other secrets. The tamper detect
circuitry can kill the contents of this master key memory (mkm). The
main CPU will access the mkm via the FPGA, and therefore the FPGA needs
an interface for the mkm - the mkmif core.
Using the Novena and one of the older Cryptech noise boards with wires,
the memory chip on a breadboard has been connected to the Novena. I've
now verified that SW on the Novena can use the mkmif core to talk to the
specific memory, the Microchip 23K640. (see included pic.)
It is possible to initiate the memory in the correct access mode
(sequential operation), read and write 32 bit words. Access works
reliably between 300 Hz and 10 MHz.
This initial version of mkmif does not do anything fancy like remanence
mitigation or automatic zeroisation. But now when the mkmif works things
like that can be added to the core.
--
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
========================================================================
Joachim Strömbergson Secworks AB joachim at secworks.se
========================================================================
-------------- next part --------------
A non-text attachment was scrubbed...
Name: mkmif_debug.jpg
Type: image/jpeg
Size: 255985 bytes
Desc: not available
URL: <https://lists.cryptech.is/archives/tech/attachments/20160510/d2ca4fa4/attachment-0001.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 905 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cryptech.is/archives/tech/attachments/20160510/d2ca4fa4/attachment-0001.sig>
More information about the Tech
mailing list