[Cryptech Tech] Lattice boards for developing a custom master key memory
Pavel Shatov
meisterpaul1 at yandex.ru
Mon May 14 12:28:35 UTC 2018
13.05.2018 17:32, Rob Austein пишет:
> On Sun, 13 May 2018 05:55:13 -0400, Peter Stuge wrote:
> ...
>> Tamper detection can fail in two ways:
>> 1. Detection wipes keys too often.
>> 2. Detection doesn't wipe key when attacked.
>> I think which failure mode one prefers depends on the application,
>
> So maybe we want physical hardware fast enough to support either mode,
> with the choice of mode selectable when synthesizing the Verilog.
Yes, if we use a tiny FPGA as the master key storage, then it's up to
the firmware of that FPGA whether to directly connect tamper inputs to
resets or to synchronize them beforehand. This can be changed on the fly
without board redesign. Good point.
> _______________________________________________
> Tech mailing list
> Tech at cryptech.is
> https://lists.cryptech.is/listinfo/tech
>
--
With best regards,
Pavel Shatov
More information about the Tech
mailing list