[Cryptech Tech] Lattice boards for developing a custom master key memory

Pavel Shatov meisterpaul1 at yandex.ru
Mon May 14 12:28:35 UTC 2018


13.05.2018 17:32, Rob Austein пишет:
 > On Sun, 13 May 2018 05:55:13 -0400, Peter Stuge wrote:
 > ...
 >> Tamper detection can fail in two ways:
 >> 1. Detection wipes keys too often.
 >> 2. Detection doesn't wipe key when attacked.
 >> I think which failure mode one prefers depends on the application,
 >
 > So maybe we want physical hardware fast enough to support either mode,
 > with the choice of mode selectable when synthesizing the Verilog.

Yes, if we use a tiny FPGA as the master key storage, then it's up to 
the firmware of that FPGA whether to directly connect tamper inputs to 
resets or to synchronize them beforehand. This can be changed on the fly 
without board redesign. Good point.

 > _______________________________________________
 > Tech mailing list
 > Tech at cryptech.is
 > https://lists.cryptech.is/listinfo/tech
 >


-- 
With best regards,
Pavel Shatov


More information about the Tech mailing list