Leichter, Jerry wrote:
While analysis of the actual silicon will clearly have to be part of
any solution, it's going to be much harder than that:
1. Critical circuitry will likely be "tamper-resistant".
Tamper-resistance techniques make it hard to see what's
there, too. So, paradoxically, the very mechanisms used
to protect circuitry against one attack make it more
vulnerable to another. What this highlights, perhaps,
is the need for "transparent" tamper-resistance techniques,
which prevent tampering but don't interfere with inspec-
tion.
traditional approach is to make the compromise more expensive that any
reasonable expectation of benefit (security proportional to risk).
helping bracket expected fraud ROI is an infrastructure that can (quickly)
invalidate (identified) compromised units. there has been some issues
with these kinds of infrastructures since they have also been identified
with being able to support DRM (& other kinds of anti-piracy) efforts.
disclaimer: we actually have done some number of patents (that are
assigned)
in this area
http://www.garlic.com/~lynn/aadssummary.htm
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]