SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Advanced and Low-
Complexity Authentication
Benedikt Driessen
Product counterfeiting inflicts billions
of dollars in damages to businesses
Page 2February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
IACC (int'l anti-counterfeiting coalition) Daily more news
 It is estimated that
counterfeiting is a $600 billion
a year problem
 It's a problem that has grown
over 10,000 percent in the
past two decades
 ~5% to 7% of the world trade
is in counterfeit goods
Why device authentication?
Page 3February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Docking station
RELIABILITY
Toner & printer
cartridges
BUSINESS
Projector
QUALITY
Company
Brand
IMAGE
AC adapter
LIABILITY
Medical devices
SAFETY
Example of a Printer Manufacturer
Page 4February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Change of revenue model
 Subsidize printer price
 Offset costs by selling
premium ink cartridges
Authentication helps to protect
 Revenue stream
 Business model
 Warranty issues
Cryptography is needed
Cryptography for Authentication
Page 5February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Which authentication mechanism?1
Which algorithms?2
Storage and programming of keys?3
Symmetric Authentication
Page 6February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Keys in printer and cartridge similar, must be protected in both
Complicated key management to avoid "break one, own all" scenario
DECENC
Drawbacks
Asymmetric Authentication
Page 7February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Protection of secret key only in cartridge
Keys are unique per cartridge
DECENC
Advantages
Cryptography for Authentication
Page 8February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Which authentication mechanism?1
Which algorithms?2
Storage and programming of keys?3
Asymmetric cryptography

Rivest-Shamir-Adleman (RSA)
Page 9February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Long keys (e.g. 384 byte, 1920 byte)
Prohibitive performance on embedded devices
Drawbacks
c ≡ me mod N
Elliptic Curve Cryptography (ECC)
Page 10February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Short keys (e.g. 32 byte, 65 byte)
Much better performance on embedded devices
Advantages
Cryptography for Authentication
Page 11February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Choose cryptographic authentication mechanism1
Which algorithms?2
Storage and programming of keys?3
Asymmetric Cryptography
Elliptic Curve Cryptography


Implementation Challenges
Page 12February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Common pitfalls
 Implementations need to guard against side channel attacks
 Protect against fault injection
 Countermeasures against physical key extraction
Source: Dr. David Oswald
Bootstrapping Trust
Page 13February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
PersonalizationDicing Packaging
Secure Facility
Secure manufacturing enables security in the field
 Programming keys must happen in a highly secured environment
 Challenges due to training, equipment and certification
 Impossible if manufacturing is not under control
Cryptography for Authentication
Page 14February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Choose cryptographic authentication mechanism1
Implement suitable set of algorithms securely2
Storage and programming of keys?3
Asymmetric Cryptography
Elliptic Curve Cryptography
Secure hardware in secure environment



OPTIGA™ Trust
Advanced and Low-Complexity
Authentication
Page 15February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Host side Documentation
Product Evaluation kit
 C-library for host side
support
 Download from
myinfineon.com
 Databook
 Application notes on ECC
authentication, NVM usage,
SWI interface
 Windows based GUI
 USB format
 Unique key pair per device
 163 bit ECC
 3.5 kBit user NVM
 SWI interface
Easy Integration
Page 16February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Integration of the OPTIGATM Trust
 Keys pre-programmed in secure environment
 Single-wire interface
 Very compact package (USON-3, 2mm x 3mm)
 Software support (C-library) for host side
OPTIGA™ Trust Evaluation Board
Page 17February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
For demo
 USB: Simulated Host
 Windows based GUI
For evaluation
 Based on IFX XMC4500
 Built-in JTAG interface for debugging
 IDE with free license (HiTOP)
The possible applications are endless
Page 18February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Electronic accessory
authentication
(e.g. MP3 players)
ICT Infrastructure
authentication
(e.g. routers)
Gaming
authentication
(e.g. slot machines)
Industrial
Printer cartridge
authentication
Medical equipment
authentication
Cloud computing
authentication
Software/ IP
authentication
Internet of Things
 Connected Home
 M2M
Communication
Interested in more information?
Page 20February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved.
Visit Infineon at Hall 5, booth 360
Contact
Timo Grassmann
Product Marketing Manager
Timo.Grassmann@infineon.com
More
www.infineon.com

Weitere ähnliche Inhalte

Andere mochten auch

Silicon Schottky Diode | Infineon Technologies
Silicon Schottky Diode | Infineon TechnologiesSilicon Schottky Diode | Infineon Technologies
Silicon Schottky Diode | Infineon TechnologiesInfineon Technologies AG
 
LED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon TechnologiesLED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon TechnologiesInfineon Technologies AG
 
Energy Efficient Lighting | Infineon Technologies
Energy Efficient Lighting  | Infineon TechnologiesEnergy Efficient Lighting  | Infineon Technologies
Energy Efficient Lighting | Infineon TechnologiesInfineon Technologies AG
 
Infineon Technologies - Company Presentation Business Year 2014
Infineon Technologies - Company Presentation Business Year 2014Infineon Technologies - Company Presentation Business Year 2014
Infineon Technologies - Company Presentation Business Year 2014Infineon Technologies AG
 
Infineon Technologies Company Presentation Q2 2014
Infineon Technologies Company Presentation Q2 2014Infineon Technologies Company Presentation Q2 2014
Infineon Technologies Company Presentation Q2 2014Infineon Technologies AG
 
Infineon Unternehmenspräsentation Q1 2015
Infineon Unternehmenspräsentation Q1 2015Infineon Unternehmenspräsentation Q1 2015
Infineon Unternehmenspräsentation Q1 2015Infineon Technologies AG
 
LED Driver "BCR401W" | Infineon Technologies
 LED Driver "BCR401W" | Infineon Technologies LED Driver "BCR401W" | Infineon Technologies
LED Driver "BCR401W" | Infineon TechnologiesInfineon Technologies AG
 
Battery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon TechnologiesBattery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon TechnologiesInfineon Technologies AG
 

Andere mochten auch (12)

Silicon Schottky Diode | Infineon Technologies
Silicon Schottky Diode | Infineon TechnologiesSilicon Schottky Diode | Infineon Technologies
Silicon Schottky Diode | Infineon Technologies
 
Infineon DLD Conference 2015
Infineon DLD Conference 2015Infineon DLD Conference 2015
Infineon DLD Conference 2015
 
Infineon Car Security
Infineon Car SecurityInfineon Car Security
Infineon Car Security
 
Infineon company presentation q3 2014
Infineon company presentation q3 2014Infineon company presentation q3 2014
Infineon company presentation q3 2014
 
LED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon TechnologiesLED Driver "BCR401U"| Infineon Technologies
LED Driver "BCR401U"| Infineon Technologies
 
Energy Efficient Lighting | Infineon Technologies
Energy Efficient Lighting  | Infineon TechnologiesEnergy Efficient Lighting  | Infineon Technologies
Energy Efficient Lighting | Infineon Technologies
 
Infineon Company Presentation Q1 2015
Infineon Company Presentation Q1 2015Infineon Company Presentation Q1 2015
Infineon Company Presentation Q1 2015
 
Infineon Technologies - Company Presentation Business Year 2014
Infineon Technologies - Company Presentation Business Year 2014Infineon Technologies - Company Presentation Business Year 2014
Infineon Technologies - Company Presentation Business Year 2014
 
Infineon Technologies Company Presentation Q2 2014
Infineon Technologies Company Presentation Q2 2014Infineon Technologies Company Presentation Q2 2014
Infineon Technologies Company Presentation Q2 2014
 
Infineon Unternehmenspräsentation Q1 2015
Infineon Unternehmenspräsentation Q1 2015Infineon Unternehmenspräsentation Q1 2015
Infineon Unternehmenspräsentation Q1 2015
 
LED Driver "BCR401W" | Infineon Technologies
 LED Driver "BCR401W" | Infineon Technologies LED Driver "BCR401W" | Infineon Technologies
LED Driver "BCR401W" | Infineon Technologies
 
Battery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon TechnologiesBattery powered Applications: Selection Guide | Infineon Technologies
Battery powered Applications: Selection Guide | Infineon Technologies
 

Ähnlich wie Advanced and Low-Complexity Authentication

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Securityteam-WIBU
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserM2M Alliance e.V.
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...TI Safe
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMOAMETIC
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Benjamin Cabé
 
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraConnected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraTyfone, Inc.
 
Embedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollersEmbedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollersteam-WIBU
 
Keynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien VergerKeynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien VergerRSD
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMSegment Security Services s.r.o.
 
Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBMFIDO Alliance
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...Capgemini
 
Securing your IoT Thing
Securing your IoT ThingSecuring your IoT Thing
Securing your IoT ThingDuncan Purves
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for GrowthForgeRock
 

Ähnlich wie Advanced and Low-Complexity Authentication (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Security
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraConnected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
 
Embedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollersEmbedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollers
 
Keynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien VergerKeynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien Verger
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
 
Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBM
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...
 
Securing your IoT Thing
Securing your IoT ThingSecuring your IoT Thing
Securing your IoT Thing
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Infineon Inverstor Relations Q4 2015
Infineon Inverstor Relations Q4 2015Infineon Inverstor Relations Q4 2015
Infineon Inverstor Relations Q4 2015
 
2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth2015 Identity Summit - The Identity Broker as Driver for Growth
2015 Identity Summit - The Identity Broker as Driver for Growth
 

Mehr von Infineon Technologies AG

Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014
Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014
Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014Infineon Technologies AG
 
Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014Infineon Technologies AG
 
Infineon Technologies Company Presentation Q1 2014
Infineon Technologies Company Presentation Q1 2014Infineon Technologies Company Presentation Q1 2014
Infineon Technologies Company Presentation Q1 2014Infineon Technologies AG
 
LED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon TechnologiesLED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon TechnologiesInfineon Technologies AG
 
Solutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon TechnologiesSolutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon TechnologiesInfineon Technologies AG
 
High Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon TechnologiesHigh Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon TechnologiesInfineon Technologies AG
 
NPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon TechnologiesNPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon TechnologiesInfineon Technologies AG
 
PNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon TechnologiesPNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon TechnologiesInfineon Technologies AG
 
LED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon TechnologiesLED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon TechnologiesInfineon Technologies AG
 
LED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon TechnologiesLED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon TechnologiesInfineon Technologies AG
 
GPS Applications - RF & Protection Devices | Infineon Technologies
GPS Applications - RF & Protection Devices | Infineon TechnologiesGPS Applications - RF & Protection Devices | Infineon Technologies
GPS Applications - RF & Protection Devices | Infineon TechnologiesInfineon Technologies AG
 

Mehr von Infineon Technologies AG (15)

NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
 
Securing railway control systems
Securing railway control systemsSecuring railway control systems
Securing railway control systems
 
Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014
Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014
Infineon Technologies - Unternehmenspräsentation Geschäftsjahr 2014
 
Car security driving trust
Car security driving trustCar security driving trust
Car security driving trust
 
Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014Infineon Technologies - Unternehmenspräsentation Q3 2014
Infineon Technologies - Unternehmenspräsentation Q3 2014
 
Infineon Technologies Company Presentation Q1 2014
Infineon Technologies Company Presentation Q1 2014Infineon Technologies Company Presentation Q1 2014
Infineon Technologies Company Presentation Q1 2014
 
LED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon TechnologiesLED Driver "BCR402U" - Datasheet | Infineon Technologies
LED Driver "BCR402U" - Datasheet | Infineon Technologies
 
Solutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon TechnologiesSolutions for Wind Energy Systems | Infineon Technologies
Solutions for Wind Energy Systems | Infineon Technologies
 
High Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon TechnologiesHigh Power Semiconductors | Infineon Technologies
High Power Semiconductors | Infineon Technologies
 
XMC4000 Brochure | Infineon Technologies
XMC4000 Brochure | Infineon TechnologiesXMC4000 Brochure | Infineon Technologies
XMC4000 Brochure | Infineon Technologies
 
NPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon TechnologiesNPN Silicon AF Transistors | Infineon Technologies
NPN Silicon AF Transistors | Infineon Technologies
 
PNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon TechnologiesPNP Silicon AF Transistor | Infineon Technologies
PNP Silicon AF Transistor | Infineon Technologies
 
LED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon TechnologiesLED Driver "BCR420U / BCR421U" | Infineon Technologies
LED Driver "BCR420U / BCR421U" | Infineon Technologies
 
LED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon TechnologiesLED Driver "BCR402W" | Infineon Technologies
LED Driver "BCR402W" | Infineon Technologies
 
GPS Applications - RF & Protection Devices | Infineon Technologies
GPS Applications - RF & Protection Devices | Infineon TechnologiesGPS Applications - RF & Protection Devices | Infineon Technologies
GPS Applications - RF & Protection Devices | Infineon Technologies
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Advanced and Low-Complexity Authentication

  • 1. Advanced and Low- Complexity Authentication Benedikt Driessen
  • 2. Product counterfeiting inflicts billions of dollars in damages to businesses Page 2February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. IACC (int'l anti-counterfeiting coalition) Daily more news  It is estimated that counterfeiting is a $600 billion a year problem  It's a problem that has grown over 10,000 percent in the past two decades  ~5% to 7% of the world trade is in counterfeit goods
  • 3. Why device authentication? Page 3February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Docking station RELIABILITY Toner & printer cartridges BUSINESS Projector QUALITY Company Brand IMAGE AC adapter LIABILITY Medical devices SAFETY
  • 4. Example of a Printer Manufacturer Page 4February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Change of revenue model  Subsidize printer price  Offset costs by selling premium ink cartridges Authentication helps to protect  Revenue stream  Business model  Warranty issues Cryptography is needed
  • 5. Cryptography for Authentication Page 5February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Which authentication mechanism?1 Which algorithms?2 Storage and programming of keys?3
  • 6. Symmetric Authentication Page 6February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Keys in printer and cartridge similar, must be protected in both Complicated key management to avoid "break one, own all" scenario DECENC Drawbacks
  • 7. Asymmetric Authentication Page 7February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Protection of secret key only in cartridge Keys are unique per cartridge DECENC Advantages
  • 8. Cryptography for Authentication Page 8February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Which authentication mechanism?1 Which algorithms?2 Storage and programming of keys?3 Asymmetric cryptography 
  • 9. Rivest-Shamir-Adleman (RSA) Page 9February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Long keys (e.g. 384 byte, 1920 byte) Prohibitive performance on embedded devices Drawbacks c ≡ me mod N
  • 10. Elliptic Curve Cryptography (ECC) Page 10February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Short keys (e.g. 32 byte, 65 byte) Much better performance on embedded devices Advantages
  • 11. Cryptography for Authentication Page 11February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Choose cryptographic authentication mechanism1 Which algorithms?2 Storage and programming of keys?3 Asymmetric Cryptography Elliptic Curve Cryptography  
  • 12. Implementation Challenges Page 12February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Common pitfalls  Implementations need to guard against side channel attacks  Protect against fault injection  Countermeasures against physical key extraction Source: Dr. David Oswald
  • 13. Bootstrapping Trust Page 13February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. PersonalizationDicing Packaging Secure Facility Secure manufacturing enables security in the field  Programming keys must happen in a highly secured environment  Challenges due to training, equipment and certification  Impossible if manufacturing is not under control
  • 14. Cryptography for Authentication Page 14February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Choose cryptographic authentication mechanism1 Implement suitable set of algorithms securely2 Storage and programming of keys?3 Asymmetric Cryptography Elliptic Curve Cryptography Secure hardware in secure environment   
  • 15. OPTIGA™ Trust Advanced and Low-Complexity Authentication Page 15February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Host side Documentation Product Evaluation kit  C-library for host side support  Download from myinfineon.com  Databook  Application notes on ECC authentication, NVM usage, SWI interface  Windows based GUI  USB format  Unique key pair per device  163 bit ECC  3.5 kBit user NVM  SWI interface
  • 16. Easy Integration Page 16February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Integration of the OPTIGATM Trust  Keys pre-programmed in secure environment  Single-wire interface  Very compact package (USON-3, 2mm x 3mm)  Software support (C-library) for host side
  • 17. OPTIGA™ Trust Evaluation Board Page 17February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. For demo  USB: Simulated Host  Windows based GUI For evaluation  Based on IFX XMC4500  Built-in JTAG interface for debugging  IDE with free license (HiTOP)
  • 18. The possible applications are endless Page 18February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Electronic accessory authentication (e.g. MP3 players) ICT Infrastructure authentication (e.g. routers) Gaming authentication (e.g. slot machines) Industrial Printer cartridge authentication Medical equipment authentication Cloud computing authentication Software/ IP authentication Internet of Things  Connected Home  M2M Communication
  • 19.
  • 20. Interested in more information? Page 20February 2015 Copyright © Infineon Technologies AG 2015. All rights reserved. Visit Infineon at Hall 5, booth 360 Contact Timo Grassmann Product Marketing Manager Timo.Grassmann@infineon.com More www.infineon.com