"Designing and implementing malicious hardware"

COMINT comint at gmail.com
Tue Apr 29 06:02:10 EDT 2008


There are high assurance systems that exist that do eactly this. There
are two different implementations of the security unit processing the
same data. The outputs are compared by a seperate high assurance and
validated module that enters into an alarm mode should the outputs
differ.

However, these are generally costly affairs, you need to pay two
implementation teams etc, therefore remain the luxury of only the most
critical systems.


For hardware, this
> would mean running multiple chips in parallel checking each others
> states/outputs.  Architectures like that have been built for
> reliability (e.g., Stratus), but generally they assume identical
> processors.  Whether you can actually build such a thing with
> deliberately different processors is an open question.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list