Re: [s-t] needle in haystack digest #3 (fwd from Nick.Barnes@pobox.com)
On Thursday, November 6, 2003, at 09:20 AM, Dave Howe wrote: No Such Agency doesn't fab much of anything; they can't afford to. They and their ilk are far more interested in things like FPGAs and adapting numerical algorithms to COTS SIMD hardware, such as graphics processors (a la http://www.gpgpu.org/). Why do they have their own fab plant if they don't fab anything? http://www.globalsecurity.org/intell/facility/nsaspl.htm The conventional--and convincing to me--story has been that they had National Semi (and maybe others) help them with local fabs. These are fabs for things like key chips (the ICs carrying keying material in whatever form, for Permissive Action Links, and ultra-sensitive kinds of stuff that they wouldn't the usual cranked-up fab workers in Sunnyvale or Nampa getting near). I heard ten years ago that the National Semi fab on-site was a lowly 2-micron fab. Which was enough for keying material. Crunching chips, for special purpose computers, don't carry the same security requirements, as the secret stuff in the code that is being run and not the fuses or links being blown. For this, they would use whatever is out there. --Tim May
Re: [s-t] needle in haystack digest #3 (fwd from Nick.Barnes@pobox.com)
At 06:00 PM 11/6/03 +0100, Eugen Leitl wrote: >I guess I didn't make myself clear. I wasn't hypothesizing an attack >against a fab. I was saying that The focus on Thomspon-trojaned tools and Chipworks-style reverse engineering is silly. There are plenty of folks who need green cards, or whose relatives do, who have modify access to the CVS of the RTL for a chip. That is the best way to add unauthorized "features" --through a technically competent insider. Since the features are not in the spec, they won't be tested for. Sure, you might have to do some work after the chips are fielded --getting the trojaned system to process a certain string, wiretapping its response-- but the payoff can be huge.
Re: [s-t] needle in haystack digest #3 (fwd from Nick.Barnes@pobox.com)
On Thursday, November 6, 2003, at 09:56 PM, Riad S. Wahby wrote: "Major Variola (ret)" <[EMAIL PROTECTED]> wrote: At 08:22 PM 11/6/03 -0800, Tim May wrote: I heard ten years ago that the National Semi fab on-site was a lowly 2-micron fab. Which was enough for keying material. And rad-hard circuits for their buddies at the NRO. Probably not on a CMOS process, though. For the most part, rad-hard==bipolar, even nowadays. Most ULSI today is BiCMOS, but Intel, Harris, and a bunch of others were making rad-hard CMOS nearly 20 years ago. The 80C86 rad hard part was and is used in a lot of critical apps. True enough, a project I consulted on picked the AMD 2901 for the Galileo Jupiter mission, and it was bipolar. And of course the concern with shrinking geometries has moved from "suntan" effects (long exposure) to SEUs. And here the advantages mostly are with SOI (as they were with SOS and SOI when I started working on SEUs in 1977). --Tim May
Re: [s-t] needle in haystack digest #3 (fwd from Nick.Barnes@pobox.com)
Tim May wrote: > On Thursday, November 6, 2003, at 09:20 AM, Dave Howe wrote: >>> No Such Agency doesn't fab much of anything; they can't afford to. >>> They and their ilk are far more interested in things like FPGAs and >>> adapting numerical algorithms to COTS SIMD hardware, such as graphics >>> processors (a la http://www.gpgpu.org/). >> Why do they have their own fab plant if they don't fab anything? >> http://www.globalsecurity.org/intell/facility/nsaspl.htm > I heard ten years ago that the National Semi fab on-site was a lowly > 2-micron fab. Which was enough for keying material. Hmm. according to the link I found and posted, they *started* at 1-micron and has been tracking its "industry partners" improvements in tech, 0.8 microns up to 1995 then .5 then onwards (with an eventual goal of 0.35, although the piece was written in 1995 so they are probably on copper now too) > Crunching chips, for special purpose computers, don't carry the same > security requirements, as the secret stuff in the code that is being > run and not the fuses or links being blown. For this, they would use > whatever is out there. Non-volitile keying material on-chip requires only standard proms - much cheaper just to buy those off the shelf; for that matter Industry standard "smartcards" usually possess cpu, eaprom program and eaprom data areas on a single chip (and the application would actually prefer some sort of dynamic memory whose contents will vanish if the power is removed from the onboard CPU but we can leave that aside for now - smartcard chips often have that too) Some of that capacity is no doubt used and intended to bridge real or artificial chip droughts (if a manu doesn't want to sell them a given chip, or raises the price drastically because he knows how essential it is to some secure device, the NSA can churn out a few thousand to fill in the gap) but there are advantages to having a completely custom chip - if no attacker could possibly know the layout, command set or capabilities of a chip, that makes his job so much harder (not quite STO - if an attacker has only one or two chips to attack, then every time he gets hit by a trap that removes a crackable device; custom chips can have such things as capacitive test pads (for detection of insulation removal) thin conductive (but visually identical) layers that must maintain continuity, and so forth.)
Re: [s-t] needle in haystack digest #3 (fwd from Nick.Barnes@pobox.com)
At 08:22 PM 11/6/03 -0800, Tim May wrote: >I heard ten years ago that the National Semi fab on-site was a lowly >2-micron fab. Which was enough for keying material. And rad-hard circuits for their buddies at the NRO. And 2 mics is fine for certain esoteric processes. Got GaAs? That's done on 6" wafers. Of import to those who like listening to the aether. But if you want a suitcase DESCracker (stuffing Sun chassis is so passe, though it was a fine recycling program and probably emptied some space in JG's garage :-) you use 90 nm FPGAs. NSA folks probably wear GSM and WEP crackers as cufflinks. Maybe they have competitions to see who can program those crackers on their kids' gameboys.
Re: [s-t] needle in haystack digest #3 (fwd from Nick.Barnes@pobox.com)
> No Such Agency doesn't fab much of anything; they can't afford to. They > and their ilk are far more interested in things like FPGAs and adapting > numerical algorithms to COTS SIMD hardware, such as graphics processors > (a la http://www.gpgpu.org/). Why do they have their own fab plant if they don't fab anything? http://www.globalsecurity.org/intell/facility/nsaspl.htm