BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:The Yin and Yang Sides of Embedded Security - Christof Paar (Ruhr 
 University Bochum)
DTSTART:20120131T124500Z
DTEND:20120131T140000Z
UID:TALK36082@talks.cam.ac.uk
CONTACT:Wei Ming Khoo
DESCRIPTION:Through the prevalence of interconnected embedded systems\, th
 e vision of pervasive computing has become reality over the last few years
 . As part of this development\, embedded security has become an increasing
 ly important issue in a multitude of applications. Examples include the St
 uxnet virus\, which has allegedly delayed the Iranian nuclear program\, ki
 ller applications in the consumer area like iTunes or Amazon's Kindle\, th
 e business models of which rely heavily on IP protection\, and even medica
 l implants like pace makers and insulin pumps that allow remote configurat
 ion. These examples show the destructive and constructive aspects of moder
 n embedded security. For us embedded security researchers\, the following 
 definition of yin and yang can be useful for resolving this seemingly conf
 lict: "The concept of yin yang is used to describe how polar opposites or 
 seemingly contrary forces are interconnected and interdependent in the nat
 ural world\, and how they give rise to each other in turn." (OK\, the "nat
 ural world" part is not a 100% fit here.) In this presentation I will talk
  about some of our research projects over the last few years which dealt w
 ith both the yin and yang aspect of embedded security. \n \n\nIn 1-2 gener
 ations of automobiles\, car2car and car2infrastructure communication will 
 be available for driver-assistance and comfort applications. The emerging 
 car2x standards call for strong security features. The large number of dat
 a from up to several 1000 incoming messages per second\, the strict cost c
 onstraints\, and the embedded environment makes this a challenging task. W
 e show how an extremely high-performance digital signature engine was real
 ized using low-cost FPGAs. Our signature engine is currently widely used i
 n field trials in the USA. The next case study addresses the other end of 
 the performance spectrum\, namely lightweight cryptography. PRESENT is one
  of the smallest known ciphers which can be realized with as few as 1000 g
 ates. The cipher was designed for extremely cost and power constrained app
 lications such as RFID tags which can be used\, e.g.\, as a tool for anti-
 counterfeiting of spare parts\, or for other low-power applications. PRESE
 NT is currently being standardized by ISO.\n\n\nAs "yang examples" of our 
 research we will show how two devices with very large deployment in the re
 al world can be broken using physical attacks. First\, we show a recent at
 tack against a modern contactless smart card equipped with 3DES. The card 
 is widely used in authentication and payment systems. The second attack br
 eaks the bit stream encryption of current FPGAs. These are reconfigurable 
 hardware devices which are popular in many digital systems. We were able t
 o extract AES and 3DES key from a single power-up of the reconfiguration p
 rocess. Once the key has been recovered\, an attacker can clone\, reverse 
 engineer and alter a presumingly secure hardware design.
LOCATION:SS03\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
