WO2002077778A2 - Encryption module with physical security or protection - Google Patents
Encryption module with physical security or protection Download PDFInfo
- Publication number
- WO2002077778A2 WO2002077778A2 PCT/EP2002/003247 EP0203247W WO02077778A2 WO 2002077778 A2 WO2002077778 A2 WO 2002077778A2 EP 0203247 W EP0203247 W EP 0203247W WO 02077778 A2 WO02077778 A2 WO 02077778A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption module
- module according
- enclosure
- adapter
- printed circuit
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
Definitions
- This invention concerns an encryption module, and in particular the physical security measures applied to such a module to maintain its operational integrity.
- Encryption of data is commonly used to provide secure communication between parties over insecure networks, such as the Internet. Encryption may be performed by the software or hardware, or by a combination of both.
- Cryptographic adapters are used to enhance the security and speed of encryption and decryption.
- the cryptographic adapter manages host computer access via a secure access policy implemented in firmware on the adapter. Delegating central processing unit (CPU) intensive cryptographic processing from the host to such a dedicated device, enables faster transaction throughput without degradation to the host's CPU.
- CPU central processing unit
- Steel enclosures are sometimes secured around cryptographic adapters to provide a physical security barrier. Attempts to remove the steel will often destroy the adapter within. The steel enclosures are generally provided with perforated areas to ventilate the adapter and limit heat build up during use. Additional physical security measures include fine line circuit patterns around the electronics to complicate probing, and micro-pressure actuators to trigger tamper mechanisms.
- an electromagnetic shield for contactless smartcards is shown.
- the electromagnetic shield has the purpose to prevent unauthorized access to the information on the smartcards.
- the electromagnetic shield may consist of two halves of plastic reinforcing shells in which an encasement made of magnetic metal alloy is contained. In order to operate the smartcard needs to be removed from the shield.
- the smartcard of US 6,121 ,544 cannot be used within the electromagnetic shield. Rather, the electromagnetic shield prevents usage of the smartcard and the cover does not have thermal characteris- tics such that a steady state temperature is achieved during use.
- a tamper resistance smartcard and a method of protecting the data in a smartcard are disclosed.
- the smartcard may use a personal identification number to encrypt the private information.
- the smartcard further uses a battery and volatile memory which is erased if the battery is dis- connected.
- the covers of the casing of the smartcard are sealed together with adhesive material.
- the invention is an encryption module having a cryptographic adapter configured for connection to a host system bus to manage host computer access via a secure access policy implemented in firmware on the adapter, the adapter being encased in a sealed cover which is designed with thermal characteristics so that a steady state temperature is achieved during use that is safe for continuous operation of the cryptographic adapter. Also included in the module are tamper detection devices to provide an alert should attempts be made to remove the cover, and software configurable tamper detection to in- prise a tamper response upon removal of adapter from the host system bus.
- the electronics of the adapter may be mounted on a PCB (Printed Circuit Board) which include slots and rebates to cooperate with flanges and recesses on the half covers to allow them to fit together capturing the PCB between them.
- the cover may comprise two half covers made of opaque poly- carbonate material and ultrasonically welded together.
- a daughterboard may be included, sitting above the PCB, to house memory devices.
- the tamper detecting mechanisms may include:
- the physical barrier provided by the cover prevents physical access to the printed circuit board and electronic components.
- Polycarbonate is the preferred material because of its physical properties, such as impact resistance, fire retardation, good dimensional stability and low creep. Polycarbonate is a physically strong material but is able to display evidence of an attack and signs of forced entry to the module, such as scrapes and scratches and the traces of knife cuts and stabs on its surfaces. Polycarbonate has a Rockwell hardness of M70 and Izod Impact strength (J m "1 ) of 600-850. Polycarbonate has a thermal conductivity at 230C (W m "1 K “1 ) with results 0.19-0.22 and thermal expansivity (x10 "6 K “1 ) with results 66-70. Packing the circuitry densely also helps to prevent logic probes being used effectively. Constant or random exponentiation times may be used to countermeasure timing attacks.
- Fig. 1 is an exploded view of a encryption module comprising of the front cover, cryptographic adapter and rear cover.
- Fig. 2 is a diagram of the rear side of the cryptographic adapter indicating the location of micro-pressure switches.
- Fig. 3 is a diagram of the front side of the cryptographic adapter indicating the location of other tamper detection switches.
- the encryption module comprises a front cover 1 and a rear cover 2 enclosing the electronics components of a cryptographic adapter indicated generally at 3.
- the electronics components are housed on a one half length PCB 4, with dimensions 98mm by 205mm, and memory devices are housed on an upside down daughterboard 5.
- the daughterboard is connected to the PCB and separated from it using a spacer 6.
- the daughterboard is arranged upside down against the PCB to minimise space within the enclosure and to provide added security for the memory devices by facing them inwardly and also by having the rear side of the daughterboard fac- ing the front cover.
- Front cover 1 has recesses 10, 11 , 12 and 13, and rear cover 2 has flanges 20, 21 , 22 and 23.
- the PCB 4 has four slots at 40, 41 , 42, and 43 and two rebates 44 and 45.
- Front cover 1 and rear cover 2 are made of- polycarbonate material and are fitted together so that slot 40 in PCB 4 allows flange 20 in rear cover 2 to pass through it and join with recess 10 in front cover 1. Similarly, slot 41 allows flange 21 to join with recess 1 1. Slot 42 allows flange 22 to join with recess 12. Slot 43 allows flange 23 to join with recess 13.
- front and rear covers After the front and rear covers are fitted together, they are ultrasonically welded to form a sealed enclosure.
- Rebates 44 and 45 allow for the covers 1 and 3 to fully enclose the PCB 4 and the daughterboard 5.
- rebate 30 allows flange 31 to fully seal rear cover 2 beneath front cover 1 . This seal is continuous along the top section of the PCB 4 which is a vulnerable section once installed into a computer.
- the rebate 30 provides additional strength to the enclosure when flange 31 is ultrasonically welded to the top section of front cover 1 .
- the rebates on PCB 4 allow an interlocking configuration of front cover 1 , rear cover 2 and PCB 4, resulting in permanent destruction to the PCB 4 when attempts are made at opening the enclosure.
- a thermal rise occurs in the bonding areas, that is the contact points between the flanges of the rear cover 2 and the recesses of front cover 1.
- the thermal rise is produced by the absorption of mechanical vibrations, the reflection of the vibrations in the connecting area, and the friction of the surfaces. Vibrations are introduced vertically, and frictional heat is produced so that the polycarbonate plasticises locally, forging an insoluble connection between the front and rear covers within a very short period of time.
- the joint quality is very uniform because the energy transfer, and the released internal heat remains constant and is limited to the joining area.
- the bonds between the front and rear covers are solid and homogenous since there is diffusion of polycarbonate material between the covers.
- a mm seam will have a strength approaching that of the original material.
- the enclosure formed by the front and rear covers prevents direct external access to the cryptographic processing elements and memory containing sensitive data.
- the seal between the front and rear covers has almost equal strength to the covers themselves, which makes it difficult to distinguish the seam after the-front and rear covers have been ultrasonically welded-together.
- Low heat producing components have been specifically selected, such as a microprocessor designed for embedded applications to reduce the overall heat production of the adapter. Heat balancing ensures that the PCB and daughterboard reach a steady state temperature during use that is safe for con- tinuous operation of the electronics. This removes the need for ventilation holes or perforations in the covers allowing for additional tamper detection such as the light sensitive switches, to be installed.
- the thermal conductivity of the polycarbonate covers is low in comparison with materials such as metal, heat transfer convection is kept low as the heat transferred by the electronic compo- nents is proportional to the exposed surface area of the covers, and this ensures that radiation heat transfer is kept to a minimum, providing for very favourable thermal characteristics.
- the thermal characteristics of the covers allow the adapter to reach a steady state temperature for safe operation of the electronic components on the PCB and daughterboard. With- out having perforations in the enclosure would provide more effective and reliable operation of tamper detection components used within the enclosure and would also prevent other undetectable physical probing.
- tamper-detecting devices within the enclosure formed by the covers there are tamper-detecting devices. These devices may include light sensitive devices, activated by open- ing the covers and allowing light to penetrate the enclosure. Also there are pressure switches, activated by lifting the covers away from the PCB.
- micro-pressure switches and actuators 50, 51 , 52, 53 and 54 are strategically located.
- micro-pressure switches with inbuilt actuators forming a single component 55, 56, 57 and 58 are strategically located. These components are part of the integrated physical protection of the module in addition to the enclosure.
- a tamper response mechanism is activated when an attempt to open the covers is detected or when-the-adapter is removed from the PCI slot.
- the tarn- per response mechanism removes power from the memory devices, resulting in an unknown and corrupt state within the memory devices, effectively erasing data stored within the memory devices.
- the module's tamper response will effectively destroy all sensitive information and cryptographic keys rather than exposing them.
- Optical remote visible and audible alarms, or monitoring can be at- tached to the PCB via an output link.
- An authenticated user can place the adapter into Transport Mode by disabling the "tamper upon removal of the adapter from the PCI slot” condition.
- Tamper detection is active in poweron and poweroff states.
- any other polymers or plastic resins would be a suitable substitute such as polyester or fibreglass. While plastics are all related, each resin has attributes that make it best suited to a particular environment or situation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Casings For Electric Apparatus (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02708363A EP1370919A2 (en) | 2001-03-22 | 2002-03-22 | Encryption module with physical security or protection |
AU2002242733A AU2002242733A1 (en) | 2001-03-22 | 2002-03-22 | Encryption module with physical security or protection |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPR3898 | 2001-03-22 | ||
AUPR3898A AUPR389801A0 (en) | 2001-03-22 | 2001-03-22 | An encryption module |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002077778A2 true WO2002077778A2 (en) | 2002-10-03 |
WO2002077778A3 WO2002077778A3 (en) | 2003-09-04 |
Family
ID=3827905
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2002/003247 WO2002077778A2 (en) | 2001-03-22 | 2002-03-22 | Encryption module with physical security or protection |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1370919A2 (en) |
AU (2) | AUPR389801A0 (en) |
WO (1) | WO2002077778A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11270032B1 (en) | 2018-12-27 | 2022-03-08 | Thales E-Security, Inc. | Tamper switch assembly and installation method thereof |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5148481A (en) * | 1989-10-06 | 1992-09-15 | International Business Machines Corporation | Transaction system security method and apparatus |
US5998858A (en) * | 1995-07-20 | 1999-12-07 | Dallas Semiconductor Corporation | Microcircuit with memory that is protected by both hardware and software |
US5956415A (en) * | 1996-01-26 | 1999-09-21 | Harris Corporation | Enhanced security fingerprint sensor package and related methods |
US5790670A (en) * | 1996-07-18 | 1998-08-04 | Citicorp Development Center, Inc. | Apparatus and method for securing electronic circuitry |
JP4033310B2 (en) * | 1997-12-16 | 2008-01-16 | 富士通株式会社 | Auxiliary storage device for information equipment and information equipment |
-
2001
- 2001-03-22 AU AUPR3898A patent/AUPR389801A0/en not_active Abandoned
-
2002
- 2002-03-22 EP EP02708363A patent/EP1370919A2/en not_active Withdrawn
- 2002-03-22 WO PCT/EP2002/003247 patent/WO2002077778A2/en not_active Application Discontinuation
- 2002-03-22 AU AU2002242733A patent/AU2002242733A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11270032B1 (en) | 2018-12-27 | 2022-03-08 | Thales E-Security, Inc. | Tamper switch assembly and installation method thereof |
Also Published As
Publication number | Publication date |
---|---|
EP1370919A2 (en) | 2003-12-17 |
AU2002242733A1 (en) | 2002-10-08 |
WO2002077778A3 (en) | 2003-09-04 |
AUPR389801A0 (en) | 2001-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5159629A (en) | Data protection by detection of intrusion into electronic assemblies | |
US8687371B2 (en) | Tamper respondent module | |
EP3040902B1 (en) | Usb security device and method | |
US7323986B2 (en) | Reusable tamper respondent enclosure | |
US6512454B2 (en) | Tamper resistant enclosure for an electronic device and electrical assembly utilizing same | |
US6646565B1 (en) | Point of sale (POS) terminal security system | |
EP0964361A1 (en) | Protection of sensitive information contained in integrated circuit cards | |
WO2010128939A1 (en) | Arrangement for cooling tamper protected circuitry | |
CN100576985C (en) | safety cover | |
US20100024046A1 (en) | Methods and systems for detecting a lateral intrusion of a secure electronic component enclosure | |
US20130298252A1 (en) | System for mechanical and electronic protection of safe equipment | |
US7495554B2 (en) | Clamshell protective encasement | |
WO2002077778A2 (en) | Encryption module with physical security or protection | |
AU785229B2 (en) | An encryption module | |
WO2023073484A1 (en) | Hardware protection module | |
CN218866475U (en) | Password device | |
EP2892161B1 (en) | Mobile terminal provided with security function | |
CN111868729A (en) | Intrusion protected memory assembly | |
EP1801723B1 (en) | Device for verifying an identification code | |
US20240012952A1 (en) | Secure module, electronic payment terminal, corresponding detection method | |
Yang et al. | Security systems of point-of-sales devices | |
KR20250124543A (en) | Anti-tamper apparatus and method | |
HK1136379B (en) | Secured housing | |
BR102012026965A2 (en) | security system for the mechanical and electronic protection of securities trading equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002708363 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002708363 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2002708363 Country of ref document: EP |