[Cryptography] Dumb idea: open-source hardware USB key for crypto

ianG iang at iang.org
Mon Jan 13 02:51:28 EST 2014


On 13/01/14 02:16 AM, Joshua Marpet wrote:
> I'm friends with Travis Goodspeed, and if you don't know who he is, he's
> the crazed lunatic (said fondly) who decaps chips for fun, to read out,
> for example, the entire RSA SecurID chip on a keyfob, or a cryptographic
> system of all shapes and sizes.  FYI, he can re-enable an expired
> SecurID fob.  So epoxying chips is good as a detective measure (as in, I
> see something was done!)  It's not so good as a preventative measure.
>
> He's the one who taught me to use syringe needles as probes to find JTAG
> ports on IC's, since they're stiff, come to a point, and are easy to
> manipulate.  (Works great, by the way)



Sounds like lots of fun!  For the most part, I would say that all 
devices can be defeated in the lab by persistent attack, and the primary 
protection is:  Don't lose your stick!

In the first instance we need to get things going.

Much later on, it might be fun to start attacking the various ideas and 
see which can resist, which can boost their resistance, etc.

What does Travis recommend for preventing attacks?  Microswitches? Acid 
bottles?  Plastique?



iang


> On Sun, Jan 12, 2014 at 3:01 AM, ianG <iang at iang.org
> <mailto:iang at iang.org>> wrote:
>
>     On 11/01/14 01:53 AM, Bill Cox wrote:
>
>         I've been noodling the idea of a USB stick designed in a way that we
>         can trust the crypto that goes on there.  It's a hard problem, but
>         there seems to be some guidelines that could help:
>...
>
>     Responding to all, it seems that the only constant here is USB, and
>     nobody's particularly wedded to that.
>
>     So, we don't know what the best solution is.
>
>
>
>           Could we make such a beast?
>
>
>
>     Let a thousand flowers bloom.  Get your ideas out and try it.  One
>     thing is clear:  not having anything is generally less secure than
>     having something...
>
>     iang
>


More information about the cryptography mailing list