温州有什么特产| 望梅止渴的梅是什么梅| 皮肤瘙痒用什么药膏| 双肺微结节是什么意思| 蜂蜜和柠檬一起喝有什么作用| nox是什么意思| 死鬼什么意思| 左眉上方有痣代表什么| 身体寒湿重吃什么好| 十月九号什么星座| syphilis是什么意思| 1970年属什么生肖| 老人生日送什么礼物好| 耳朵响是什么原因| 三叉神经痛看什么科| 明目张胆是什么生肖| 什么是贫血| 菩提子长什么样| 紧急避孕药什么时候吃最有效| 肺结节是什么病| 看扁桃体挂什么科| 经常头疼挂什么科| 身上发痒是什么原因| 粉色裤子配什么上衣好看| 壮阳吃什么药| 为什么吃了避孕药还是怀孕了| 晚上吃什么有助于减肥| 最近我和你都有一样的心情什么歌| 静待花开什么意思| 身上为什么会起湿疹| b-h是什么药| 莲花和荷花有什么区别| 齿痕舌吃什么中成药| 什么七什么八| asmr是什么意思| 下丘脑分泌什么激素| 尿酸升高是什么原因| 头部容易出汗是什么原因| 梦见山体滑坡是什么意思| kalenji是什么品牌| 哺乳期牙龈肿痛可以吃什么药| md是什么意思| 肺肿瘤不能吃什么| 今年72岁属什么生肖| 美妞是什么意思| 孤注一掷什么意思| 死是什么感觉| 松香对人体有什么危害| 肝内胆管结石吃什么药好| 什么馅的饺子好吃| 心包填塞三联征是什么| 红楼梦贾家为什么被抄家| 更年期一般在什么年龄| 间皮瘤是什么病| 早谢是什么症状| 疔是什么意思| 嗓子疼吃什么药见效最快| pe什么意思| 定海神针是什么意思| 希腊人是什么人种| 情定三生大结局是什么| 高嘌呤是什么意思| 什么样的野花| 父亲坐过牢对孩子有什么影响| gi是什么意思| 大男子主义的男人喜欢什么样的女人| 什么情况下需要打破伤风针| prada是什么牌子| 大便溏泄是什么意思| 肾火旺有什么症状| 梦到狐狸是什么意思| 前列腺炎是什么症状| hpv12种高危型阳性是什么意思| 卵巢分泌什么激素| 米咖色是什么颜色| 经期吃什么水果| 小李子为什么叫小李子| 大户人家什么意思| 起床眼睛肿是什么原因| 牙齿痛是什么原因| 心律不齐是什么意思| 沙加女是什么字| 拾人牙慧的意思是什么| 男性粘液丝高什么原因| 四川有什么山| 转氨酶高挂什么科| 直立倾斜试验阳性是什么病| 1月19日什么星座| 石几念什么| 西多士是什么| 白带是绿色的是什么原因| 天干是什么意思| 龙王庙是指什么生肖| 善良对什么| 额头老出汗是什么原因| 不时之需是什么意思| 诺贝尔奖是什么意思| 线下是什么意思| 洞房花烛是什么生肖| 脚气是什么原因引起的| 偏头疼是什么症状| 8月18日什么星座| 关心则乱是什么意思| 什么是白平衡| 父亲是o型血孩子是什么血型| 甲氰咪胍又叫什么| 绝望的绝是什么意思| 附件炎有什么症状| mlb中文叫什么| 豆五行属什么| 月经期间适合吃什么| 什么是渎职| 什么车最长| 潮吹是什么样的| 贫血不能吃什么| 10月20日是什么星座| 眼睛发痒是什么原因| z是什么品牌| 扬是什么生肖| 你算什么东西| 身体燥热是什么原因| 黄体酮吃多了有什么副作用| 阴湿是什么病| 祸不及家人前一句是什么| opo是什么意思| 顽固不化是什么意思| 什么是心率| 卵巢早衰是什么引起的| 女性安全期是什么时候| 哺乳期抽烟对宝宝有什么影响| 钢琴八级是什么水平| 长期胃胀是什么原因| 高密度脂蛋白胆固醇偏低是什么意思| 空降兵属于什么兵种| 一热就咳嗽是什么原因| 氮泵有什么作用| 月加一笔是什么字| 今年37岁属什么生肖| 公历和农历有什么区别| 女性尿急憋不住尿是什么原因| 红房子是什么| 铁蛋白低是什么意思| 木字旁的字与什么有关| 小便短赤吃什么药| 高密度脂蛋白偏高是什么原因| 什么样的人容易孕酮低| 卵巢早衰是什么原因引起的| 一什么眉毛填量词| 什么人不能吃苦瓜| 葛根粉有什么功效| 霸王餐是什么意思| 明前茶什么意思| 下午六点多是什么时辰| 小河边有什么| 泰国有什么好玩| 肴肉是什么肉| 心慌挂什么科| 奚字五行属什么| 紧急避孕药有什么副作用| 巨蟹男喜欢什么样的女生| 龙的三合生肖是什么| 眼睛肿胀是什么原因| viscose是什么面料| 为什么要文化大革命| 麦芽糊精是什么| 引体向上有什么好处| 什么食物胶原蛋白含量高| 大小便失禁是什么原因造成的| 荷尔蒙是什么东西| 肠系膜淋巴结肿大吃什么药| 关东煮为什么叫关东煮| 吃坏东西拉肚子吃什么药| 寿元是什么意思| 辅酶q10什么时候吃最好| 耳鸣是什么| ro什么意思| 什么是985| 什么病不能吃玉米| 头部神经痛吃什么药好| 天性使然什么意思| 秋天开什么花| 莲子心和什么搭配泡水喝最好| 鹿晗的粉丝名叫什么| 肚子疼是什么病| 宫颈管是什么| csv文件用什么打开| 下火喝什么茶| 女人梦见蜈蚣预兆什么| 刘晓庆什么星座| 胎菊泡水喝有什么功效| 芥花油是什么油| 杭盖是什么意思| 八卦是什么| 调节是什么意思| gf是什么单位| 什么地流淌| 白蛋白偏高是什么意思| 执业药师证有什么用| 腹泻吃什么药见效最快| 屁眼疼痛什么原因| 伏是什么意思| 红细胞偏低有什么危害| 9月9日什么星座| 神经性皮炎用什么药膏效果最好| 五行什么生水| 考研是什么时候考| 颅压高吃什么药| 左眼皮一直跳什么预兆| 异地办理护照需要什么材料| 吃什么水果对肝好| 手麻是什么病| 低钾血症挂什么科| 地球属于什么星| 大理寺是什么机构| 1945年是什么年| 儿茶酚胺是什么| 办护照需要准备什么材料| 白果是什么| 久经沙场是什么意思| 吃羊肉不能吃什么| 谨遵医嘱是什么意思| 女人银屑病一般都长什么地方| 北京豆汁儿什么味道| 乌江鱼是什么鱼| 动态是什么意思| 心病是什么意思| 黄水病是什么病| 白细胞减少是什么原因| 左顾右盼的顾是什么意思| 火红的太阳像什么| 腰肌劳损用什么药| 立春有什么讲究| g6pd是检查什么的| 胃肠紊乱吃什么药| 白茶什么季节喝好| 蜜蜂的天敌是什么| 圆脸适合什么发型| 念叨是什么意思| 喝水不排尿是什么原因| 10.30是什么星座| 裳能组什么词| 一厢情愿是什么意思| 生蚝不能和什么一起吃| 盲点是什么意思| 医院特需号是什么意思| 果子狸是什么动物| 咳嗽挂什么科| 时髦是什么意思| 吃秋葵有什么禁忌| 双手抽筋是什么原因| 唇上有痣代表什么| pe是什么意思| 日值四离是什么意思| 庙会是什么意思| 吃什么补脑增强记忆力| 返酸水吃什么药| 6月份种什么菜| 来月经头疼是什么原因| 什么食物补气血| 吃豌豆有什么好处| 补气补血吃什么药| 母鸡什么意思| 聚酯纤维是什么材质| 遭罪是什么意思| 百度Jump to content

中国抗癌协会-恒瑞医药创新药临床研究基金中标公告

From Wikipedia, the free encyclopedia
Western Electric 229G cryptoprocessor
百度 当时人们只是觉得特朗普善用互联网,但围绕脸书的最新披露却让人们看到了互联网上的更多门道。

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.

The purpose of a secure cryptoprocessor is to act as the keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures.[1]

Examples

[edit]

A hardware security module (HSM) contains one or more secure cryptoprocessor chips.[2][3][4] These devices are high grade secure cryptoprocessors used with enterprise servers. A hardware security module can have multiple levels of physical security with a single-chip cryptoprocessor as its most secure component. The cryptoprocessor does not reveal keys or executable instructions on a bus, except in encrypted form, and zeros keys by attempts at probing or scanning. The crypto chip(s) may also be potted in the hardware security module with other processors and memory chips that store and process encrypted data. Any attempt to remove the potting will cause the keys in the crypto chip to be zeroed. A hardware security module may also be part of a computer (for example an ATM) that operates inside a locked safe to deter theft, substitution, and tampering.

Modern smartcards are probably the most widely deployed form of secure cryptoprocessor, although more complex and versatile secure cryptoprocessors are widely deployed in systems such as Automated teller machines, TV set-top boxes, military applications, and high-security portable communication equipment.[citation needed] Some secure cryptoprocessors can even run general-purpose operating systems such as Linux inside their security boundary. Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus. This is known as bus encryption. Data processed by a cryptoprocessor is also frequently encrypted.

The Trusted Platform Module (TPM) is an implementation of a secure cryptoprocessor that brings the notion of trusted computing to ordinary PCs by enabling a secure environment.[citation needed] Present TPM implementations focus on providing a tamper-proof boot environment, and persistent and volatile storage encryption.

Security chips for embedded systems are also available that provide the same level of physical protection for keys and other secret material as a smartcard processor or TPM but in a smaller, less complex and less expensive package.[citation needed] They are often referred to as cryptographic authentication devices and are used to authenticate peripherals, accessories and/or consumables. Like TPMs, they are usually turnkey integrated circuits intended to be embedded in a system, usually soldered to a PC board.

Features

[edit]

Security measures used in secure cryptoprocessors:

  • Tamper-detecting and tamper-evident containment.
  • Conductive shield layers in the chip that prevent reading of internal signals.
  • Controlled execution to prevent timing delays from revealing any secret information.
  • Automatic zeroization of secrets in the event of tampering.
  • Chain of trust boot-loader which authenticates the operating system before loading it.
  • Chain of trust operating system which authenticates application software before loading it.
  • Hardware-based capability registers, implementing a one-way privilege separation model.

Degree of security

[edit]

Secure cryptoprocessors, while useful, are not invulnerable to attack, particularly for well-equipped and determined opponents (e.g. a government intelligence agency) who are willing to expend enough resources on the project.[5][6]

One attack on a secure cryptoprocessor targeted the IBM 4758.[7] A team at the University of Cambridge reported the successful extraction of secret information from an IBM 4758, using a combination of mathematics, and special-purpose codebreaking hardware. However, this attack was not practical in real-world systems because it required the attacker to have full access to all API functions of the device. Normal and recommended practices use the integral access control system to split authority so that no one person could mount the attack.[citation needed]

While the vulnerability they exploited was a flaw in the software loaded on the 4758, and not the architecture of the 4758 itself, their attack serves as a reminder that a security system is only as secure as its weakest link: the strong link of the 4758 hardware was rendered useless by flaws in the design and specification of the software loaded on it.

Smartcards are significantly more vulnerable, as they are more open to physical attack. Additionally, hardware backdoors can undermine security in smartcards and other cryptoprocessors unless investment is made in anti-backdoor design methods.[8]

In the case of full disk encryption applications, especially when implemented without a boot PIN, a cryptoprocessor would not be secure against a cold boot attack[9] if data remanence could be exploited to dump memory contents after the operating system has retrieved the cryptographic keys from its TPM.

However, if all of the sensitive data is stored only in cryptoprocessor memory and not in external storage, and the cryptoprocessor is designed to be unable to reveal keys or decrypted or unencrypted data on chip bonding pads or solder bumps, then such protected data would be accessible only by probing the cryptoprocessor chip after removing any packaging and metal shielding layers from the cryptoprocessor chip. This would require both physical possession of the device as well as skills and equipment beyond that of most technical personnel.

Other attack methods involve carefully analyzing the timing of various operations that might vary depending on the secret value or mapping the current consumption versus time to identify differences in the way that '0' bits are handled internally vs. '1' bits. Or the attacker may apply temperature extremes, excessively high or low clock frequencies or supply voltage that exceeds the specifications in order to induce a fault. The internal design of the cryptoprocessor can be tailored to prevent these attacks.

Some secure cryptoprocessors contain dual processor cores and generate inaccessible encryption keys when needed so that even if the circuitry is reverse engineered, it will not reveal any keys that are necessary to securely decrypt software booted from encrypted flash memory or communicated between cores.[10]

The first single-chip cryptoprocessor design was for copy protection of personal computer software (see US Patent 4,168,396, Sept 18, 1979) and was inspired by Bill Gates's Open Letter to Hobbyists.

History

[edit]

The hardware security module (HSM), a type of secure cryptoprocessor,[3][4] was invented by Egyptian-American engineer Mohamed M. Atalla,[11] in 1972.[12] He invented a high security module dubbed the "Atalla Box" which encrypted PIN and ATM messages, and protected offline devices with an un-guessable PIN-generating key.[13] In 1972, he filed a patent for the device.[14] He founded Atalla Corporation (now Utimaco Atalla) that year,[12] and commercialized the "Atalla Box" the following year,[13] officially as the Identikey system.[15] It was a card reader and customer identification system, consisting of a card reader console, two customer PIN pads, intelligent controller and built-in electronic interface package.[15] It allowed the customer to type in a secret code, which is transformed by the device, using a microprocessor, into another code for the teller.[16] During a transaction, the customer's account number was read by the card reader.[15] It was a success, and led to the wide use of high security modules.[13]

Fearful that Atalla would dominate the market, banks and credit card companies began working on an international standard in the 1970s.[13] The IBM 3624, launched in the late 1970s, adopted a similar PIN verification process to the earlier Atalla system.[17] Atalla was an early competitor to IBM in the banking security market.[14][18]

At the National Association of Mutual Savings Banks (NAMSB) conference in January 1976, Atalla unveiled an upgrade to its Identikey system, called the Interchange Identikey. It added the capabilities of processing online transactions and dealing with network security. Designed with the focus of taking bank transactions online, the Identikey system was extended to shared-facility operations. It was consistent and compatible with various switching networks, and was capable of resetting itself electronically to any one of 64,000 irreversible nonlinear algorithms as directed by card data information. The Interchange Identikey device was released in March 1976.[16] Later in 1979, Atalla introduced the first network security processor (NSP).[19] Atalla's HSM products protect 250 million card transactions every day as of 2013,[12] and secure the majority of the world's ATM transactions as of 2014.[11]

See also

[edit]

References

[edit]
  1. ^ Digital rights management : concepts, methodologies, tools, and applications. Information Resources Management Association. Hershey, Pa.: Information Science Reference (an imprint of IGI Global). 2013. p. 609. ISBN 9781466621374. OCLC 811354252.{{cite book}}: CS1 maint: others (link)
  2. ^ Ramakrishnan, Vignesh; Venugopal, Prasanth; Mukherjee, Tuhin (2015). Proceedings of the International Conference on Information Engineering, Management and Security 2015: ICIEMS 2015. Association of Scientists, Developers and Faculties (ASDF). p. 9. ISBN 9788192974279.
  3. ^ a b "Secure Sensitive Data with the BIG-IP Hardware Security Module" (PDF). F5. 2012. Retrieved 30 September 2019.
  4. ^ a b Gregg, Michael (2014). CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002. John Wiley & Sons. p. 246. ISBN 9781118930847.
  5. ^ "China Used a Tiny Chip in a Hack That Infiltrated U.S. Companies". Bloomberg.com. 4 October 2018.
  6. ^ "Secure Enclave".
  7. ^ attack on the IBM 4758 Archived 2025-08-05 at the Wayback Machine
  8. ^ Waksman, Adam (2010), "Tamper Evident Microprocessors" (PDF), Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, archived from the original (PDF) on 2025-08-05, retrieved 2025-08-05
  9. ^ J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten (February 21, 2008). "Lest We Remember: Cold Boot Attacks on Encryption Keys". Princeton University. Archived from the original on 2025-08-05. Retrieved 2025-08-05.{{cite web}}: CS1 maint: multiple names: authors list (link)
  10. ^ Secure CPU complies with DOD anti-tamper mandate
  11. ^ a b Stiennon, Richard (17 June 2014). "Key Management a Fast Growing Space". SecurityCurrent. IT-Harvest. Retrieved 21 August 2019.
  12. ^ a b c Langford, Susan (2013). "ATM Cash-out Attacks" (PDF). Hewlett Packard Enterprise. Hewlett-Packard. Retrieved 21 August 2019.
  13. ^ a b c d Bátiz-Lazo, Bernardo (2018). Cash and Dash: How ATMs and Computers Changed Banking. Oxford University Press. pp. 284 & 311. ISBN 9780191085574.
  14. ^ a b "The Economic Impacts of NIST's Data Encryption Standard (DES) Program" (PDF). National Institute of Standards and Technology. United States Department of Commerce. October 2001. Archived from the original (PDF) on 30 August 2017. Retrieved 21 August 2019.
  15. ^ a b c "ID System Designed as NCR 270 Upgrade". Computerworld. 12 (7). IDG Enterprise: 49. 13 February 1978.
  16. ^ a b "Four Products for On-Line Transactions Unveiled". Computerworld. 10 (4). IDG Enterprise: 3. 26 January 1976.
  17. ^ Konheim, Alan G. (1 April 2016). "Automated teller machines: their history and authentication protocols". Journal of Cryptographic Engineering. 6 (1): 1–29. doi:10.1007/s13389-015-0104-3. ISSN 2190-8516. S2CID 1706990.
  18. ^ "Cryptocurrency Charts - Prices.org". Cryptocurrency Live - Prices.org. Retrieved 2025-08-05.
  19. ^ Burkey, Darren (May 2018). "Data Security Overview" (PDF). Micro Focus. Retrieved 21 August 2019.

Further reading

[edit]
血热是什么原因引起的 我宣你是什么意思 胸椎退变是什么意思 减肥吃什么东西 结界是什么意思
麦芯粉是什么面粉 左后背疼是什么原因 甲硝唑吃多了有什么危害 5月31日是什么星座 拾荒者是什么意思
武松打的是什么虎 天河水是什么意思 神经性皮炎用什么药 中班小朋友应该学什么 月与什么有关
萎缩性胃炎用什么药最好 香菇配什么菜炒着好吃 诸事顺遂是什么意思 3.5是什么星座 龟代表什么生肖
利多卡因是什么hcv9jop7ns3r.cn 什么时候敷面膜效果最好hcv8jop1ns8r.cn 打马赛克是什么意思hcv9jop0ns4r.cn 离子水是什么水sanhestory.com 8月10日什么星座hcv7jop9ns8r.cn
阿莫西林和头孢有什么区别hcv7jop4ns5r.cn 丝状疣是什么原因长出来的hcv8jop3ns6r.cn 馨字取名有什么寓意gysmod.com 丑五行属什么hcv8jop8ns3r.cn ppl是什么药hcv8jop5ns5r.cn
男性左下腹痛是什么原因hcv8jop7ns7r.cn 什么是溶血性贫血hcv8jop8ns4r.cn 湿疹是什么病的前兆hcv9jop1ns2r.cn 雀舌是什么茶huizhijixie.com 烫伤用什么药膏好hcv8jop8ns1r.cn
什么是结扎hcv8jop0ns6r.cn 海澜之家属于什么档次hcv8jop2ns2r.cn 有对什么hcv9jop6ns8r.cn 阉人什么意思hlguo.com 父亲坐过牢对孩子有什么影响hcv8jop9ns7r.cn
百度