Lecture 13-Hardware Security Flashcards

1
Q

Recall: Onion routing vs Tor

A

Onion routing allows for multiple nodes, Tor only allows for 3 intermediary nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recall: What is the basic process of a Tor circuit?

A

Keep extending the circuit (request node a to connect me to node c and then request node c to pass along the connection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zerocoin summary

A

Alice generates serial number s, random r which will reveals serial number S and commits a coin C. Alice spends the zerocoin and the equal amount of bitcoin gets added to a pool. To redeem zerocoin, make it clear that the coin C belongs to the zerocoin set and that I know how to reveal the serial number since I have r and post that. Miners verify this proof and then the bitcoin gets transferred from the zerocoin escrow pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is zerocoin anonymous?

A

It relies on a zkp the coin is not linked to a specific coin in the set of zerocoins. It is not linked to the serial number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can you double spend with zerocoin?

A

No because you can’t double spend without reusing the serial number which would be detected by the verifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a side channel attack?

A

It is a non-invasive, passive attack where the attacker looks for changes in sound, heat, power, etc, and tries to see if it leaks any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What would need to happen for a timing attack to be possible?

A

Timing variations would need to exist on the basis of the value of a secret key, There needs to be a way to measure that variation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the problem with repeated squaring algorithm?

A

It leaks information if you do SPA (simple power analysis). Uses more power for multiplication which is only done when secret key is 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Countermeasures to SPA

A

generate random noise, add delays independent of key, shield the side channel leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hardware trojan?

A

An addition or modification to a circuit with malicious intent (adding another circuit to bypass encryption for example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can a design be manipulated to include hw trojan?

A

So take F(x) = x^2 to authenticate a user only for users 0-9. Bob can create a circuit where in addition to 0-9. 10 and 11 get authenticated as well (malicious). Ideally, those should get invalidated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to detect hardware trojan?

A

Do the same thing attackers do. Side channel analysis. Pros is that it could reveal a hardware trojan but cons is that it could have a high false alarm rate if the hardware has errors and analyzers think it is a hw trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PUF

A

physical unclonable function: Hardware analog is a one-way function and each puf is unique and you cannot predict the response due to various random delays and changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a vulnerability of PUF?

A

Prone to error. So if you want to reverse and get back your secret key, it will require some extra processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Silicon puf

A

Create n-bit response by sending it challenges that excites two paths and detect which path was faster (0 or 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Strong PUF

A

-used for authentication, has many challenge-response pairs

17
Q

Weak PUF

A

-only a small number of challenge-response pairs, used to do things like digitize a fingerprint

18
Q

What is a Trusted Platform Module?

A

A chip integrated into a platform to keep information extra secure

19
Q

Key components of TMP architecture?

A

You can opt-in or out, non-volatile memory is used to store long term keys and data authorization, PCR (platform configuration registers) is used to store integrity metrics of code

20
Q

TMP function (integrity measurements)

A

-used to report the integrity of firmware, OS, loaders

21
Q

TPM function (remote attestation)

A

TPM creates and signs a hash summary of hardware configuration for requester as verification that it has not changed

22
Q

TPM function (Protected storage)

A

Seal the data storage and is only accessible (decryptable) if it is in the same state it was when encrypted

23
Q

TPM key hierarchy overview

A

Each key is protected either in TPM or encrypted by a key protected by TMP. Each key has flag (non-migratable or migratable). The leaves are protected secrets/data and the intermediate nodes are the storage and identity keys