IT Industry in Armenia 22:24 07/06/2007

How Embedding Third-Party IP Can Help Prevent Security Attacks

Introduction
The creation and distribution of digital content, such as music and video, is growing rapidly. Consumers want greater flexibility and portability in terms of how and where they play digital content. For example, consumers can now play and distribute digital content using various electronic devices such as: set-top boxes, DVD players, computers and all-in-one handheld devices such as Apple’s recently announced iPhone.

While content producers and distributors embrace the proliferation of digital content, they also want to protect their assets and revenue streams by preventing unauthorized copying or redistribution of their content. According to the Motion Picture Association (MPA), piracy cost the American film industry $6.1B in 2005. The task of protecting digital content is becoming increasingly difficult, as evidenced by the recent breach of Advanced Access Content System (AACS), a content protection scheme used for HD DVD and Blu-Ray Disc (BD) formats.

In this article, we will discuss the content protection requirements required of electronic device manufacturers and the financial liabilities they face if content protection breaches occur. Two of the content protection schemes that will be discussed in this paper are the aforementioned AACS and High-Bandwidth Digital Content Protection (HDCP). HDCP is the scheme used to protect digital data as it travels across a High-Definition Multimedia Interface (HDMI) typically used to connect an HD DVD player with an HDTV monitor. This article will also cover the design requirements that are contractually required by most new content protection licenses such as AACS and HDCP, and how embedding security deeper into silicon during the System-on-Chip (SoC) design phase can be used to help protect against attacks on these protection schemes.

The Penalty for Insufficient Security
Companies that manufacture devices which process media and digital content are increasingly subjected to licensing penalties for poor security control. Industry standards such as HDMI, Blu-Ray and HD-DVD each use content protection standards such as HDCP and AACS. These standards require adopters to subscribe to a technology license with “Liquidated Damages” clauses. The licensees cannot rely on insurance because typical insurance policies do not cover these types of damages. The damage clauses state that a licensee that is building a product to the licensed standard is liable for $1M to $8M dollars in the event that the security of the product is compromised. Examples of such a compromise would be if cryptographic keys are accidentally divulged due to a licensee not properly controlling keys during the manufacturing process; or by releasing an unsecured product design that allows an attacker to retrieve the key from the product itself. In both cases, a compromise to the key results in digital content that can be stolen -- next generation DVDs can be copied and high definition digital media can be intercepted “on the wire”.

Generally, digital content is protected by cryptographic keys that are purchased from a technology licensing authority. Each key is unique and is programmed into each individual chip during manufacturing. If these cryptographic keys are exposed, then the entire security system is compromised because the keys represent the small “manageable secrets” from which content security is derived. It would be similar to a homeowner using a steel door for security but leaving the key in a plastic bag outside the door. To further this analogy, if a device maker builds a product that protects valuable music or movies, and leaves the key on the doorstep in plain view, then the content owners will have their content stolen.

Securing Encryption Keys
Most new content protection schemes specify security “robustness rules” for handling protected data on consumer devices. Generally speaking, these rules imply that security written in software is not robust. To truly secure a system, cryptographic keys should be stored and used in silicon. If the cryptographic keys are embedded in an SoC design, then it requires more time, money and sophistication on the part of an attacker to retrieve those keys. The most secure way to store a key is by programming it into the embedded, non-volatile memory of an SoC design and then using on-chip cryptographic logic so that keys are never transmitted outside the boundary of the chip.

Another critical security measure is to use a secure process technique to program keys into non-volatile memory at manufacture time. Before the days of offshore outsourcing, a security-savvy company would develop specific, in-house security procedures to closely monitor the internal manufacturing process as it relates to cryptographic key injection into SoC design. However, when using offshore manufacturers, it is difficult to distribute, control, and track unique cryptographic keys, especially when most third-party manufacturers are streamlined for low-cost efficient operations that typically do not have security measures in place. The security of that product is still the responsibility of the content protection technology licensee and product designer and a breach could cost a company all of its product revenues. Prudent designers find a way to protect cryptographic key data right up until the time when it is programmed into the chip.


Recovering from an Attack
Designers of modern consumer content protection schemes prepare for the worst so that in the event that a particular consumer device’s security is compromised, the content delivery system can recover without having to recall every device in the market or having to scrap the system. This security feature is referred to as “renewability” and could consist simply of a list of revoked keys, as can be found in the HDCP standard. Or it could be the more sophisticated “title key” updates found in the AACS scheme that uses in-band re-keying via “subset-difference trees”, a sophisticated method that allows AACS to publish new Disc titles “for every AACS player in the world, except these ones”. Both of these renewable security features use reprogrammable non-volatile memory embedded in SoC design to securely store the keys and to update the keys and security data throughout the life of the consumer product.

Recent reports have highlighted the attacks against the AACS scheme of software DVD players that allowed high definition title keys to be extracted from HD-DVD and Blu-Ray disks which were then posted on the Internet. Through the use of renewability, AACS could recover by encrypting the new high definition content titles with new title keys that would not be communicated to the broken software product that leaked the old keys. This allows security to be renewed for new disc titles in all of the players in the world that are not broken, because only the broken player will be cut out of the distribution scheme.

This is an example of the importance of renewable security systems, and the need to store renewable keys safely in hardware according to the robustness rules of the licensed content protection technology.

Cost Constraints
Content producers and distributors are the drivers behind the new security schemes as they want to ensure the protection of their assets. However, they are not willing to subsidize the cost of doing so. This puts the device manufacturer in a difficult position because consumers do not want to be burdened with additional costs associated with content protection because they do not have the same level of interest in protecting content as do the content producers. Another challenge faced by a consumer electronics vendor is how to provide a robust security system while minimizing the cost to do so. Storing the encryption keys securely in embedded non-volatile memory is an ideal solution. To minimize costs, the embedded non-volatile memory should require no additional masking, process steps or process modifications; and it should be able to be manufactured on a standard CMOS logic process.


Summary
Consumers are playing and distributing digital content using a variety of electronic devices, making the task of protecting that content increasingly difficult. Recent attacks on software content protection systems highlights the need for stronger security which can be achieved by embedding encryption keys in the SoC design, furthest from the reach of attackers. More specifically, encryption keys can be embedded in multi-time programmable non-volatile memory that can be manufactured on a standard CMOS logic process. Multi-time programming allows for renewability, which provides the system with the ability to recover from an attack. Virage Logic’s NOVeA® memory is an embedded multi-time programmable NVM which can be manufactured on a standard CMOS logic process and requires no additional masking, process steps or process modifications.

Attackers are always seeking the easiest method to steal content and the encryption keys which protect that content. As security is embedded deeper into devices, manufacturing facilities in global locations will increasingly be targeted. In an unsecure global manufacturing environment, a single bribed line worker could put a company’s entire product revenues at risk, due to key secrecy requirements built into the new content protection standards. To minimize risk, encryption keys must be kept confidential during manufacturing and programming of keys on the chips must be tracked and auditable in a way that ensures manufacturing line availability. Many companies embark on long internal development cycles to build such a secure manufacturing logistics system. A faster and less costly alternative is the Certicom KeyInject™ product that can be quickly deployed to global third party contract manufacturers while being remotely controlled from North America. KeyInject™ allows companies to adhere to the strict security requirements of the latest content protection technology licenses using a COTS product designed for global manufacturing operations.


About the Authors

Pat Lasserre, Director of NOVeA Marketing, Virage Logic
As director, NOVeA marketing, Pat Lassere is responsible for the
direction of the non-volatile memory product line including strategic
marketing and product development for the company’s patented memory
system.

Prior to joining Virage Logic, Lasserre held a variety of management,
sales, and engineering positions at several companies including
Integrated Device Technology, Integrated Silicon Solution, and Cypress
Semiconductor.

Lasserre is a certified product manager from the Association of
International Product Marketing & Management and holds a BSEE from the
University of California, Berkeley.


Brian Neill, Certified Information Systems Security Professional (CISSP), Certicom
Brian Neill is a Product Manager at Certicom Corp. Prior to his current role, Neill was a member of Certicom's Professional Services team, helping customers to engineer security into their systems and products. Neill received his B.Math degree from the University of Waterloo (Canada) in 1999.


Source Panorama.am
Share |
Տեքստում սխալ կամ վրիպակ նկատելու դեպքում, ուղարկեք խմբագրին հաղորդագրություն` նշելով տվյալ սխալը, այնուհետև սեղմելով Ctrl-Enter:

Newsfeed

17:06
Armenian villagers protest over lack of irrigation water
More than a hundred residents of Vardanashen, a village in Armenia’s Armavir Province, on Friday blocked the Yerevan-Margara highway...
16:45
Angelina Jolie accuses Brad Pitt of trying to 'bleed her dry'
It's a breakup that's lasted almost as long as the relationship that preceded it. Dubbed 'the war of the rosés,'...
16:35
Court in Yerevan rejects police lawsuit against oppositionist
The Administrative Court in Yerevan has rejected a lawsuit filed by the police against Karen Vrtanesyan, an expert on military and warfare...
15:59
Exhibition of sculptures dedicated to Charles Aznavour to be held in Yerevan
Yerevan's Two Arcs Art Space will be hosting an interactive exhibition of sculptures created by sculptor Mkrtich Mazmanian and...
15:40
Ruben Vardanyan launches hunger strike in Baku, demands release of all Armenian prisoners
The family of illegally detained philanthropist, Ruben Vardanyan, announced today that he entered into a hunger strike to demand the immediate...
15:06
Lavrov: Russia still considers Armenia an ally
Russia still considers Armenia an ally not only legally, Russian Foreign Minister Sergei Lavrov has said, highlighting Moscow's...
14:33
Stepantsminda-Larsi road closed to trucks
The Rescue Service has warned drivers about closed roads in Armenia on Friday afternoon. In particular, the roads linking the Amberd high...
14:14
Expert: What Russia gains from troop withdrawal from Artsakh?
The withdrawal of Russian peacekeepers from Artsakh (Nagorno-Karabakh) could signal a new conspiracy against Armenia, says Armen Petrosyan, a...
13:34
Opposition MP: Pashinyan lying about possible territory swap with Azerbaijan
Opposition MP Tigran Abrahamyan has brushed aside Prime Minister Nikol Pashinyan’s claims about a possible swap of territories with...
12:34
Cyprus parliament honors Armenian Genocide victims
The Cyprus House of Representatives on Thursday evening observed a minute’s silence for the victims of the Armenian genocide, with the...
12:15
EFJ and UJA demand immediate release of Narek Samsonyan and Vazgen Saghatelyan
The European Federation of Journalists (EFJ) joined its affiliate in Armenia, the Union of Journalists of Armenia (UJA), in denouncing the...
11:36
Baku must fulfil number of requirements to return to PACE, rapporteur says
Norwegian MP Lise Christoffersen, a PACE co-rapporteur on Azerbaijan, said that the Committee of Ministers is holding talks on Azerbaijan's...
11:16
Azerbaijan destroyed Kanach Zham in Shushi
Azerbaijan has destroyed the Armenian church of St. Hovhannes Mkrtich (St. John the Baptist) in Shushi, Artsakh, the Caucasus...
11:00
Iranian air defenses down three drones near Isfahan
Iranian state media said the country’s air defences brought down three small drones over the central city of Isfahan, hours after United...
17:05
Political prisoner Vazgen Saghatelyan blasts Pashinyan for crackdown on critics
Political prisoner Vazgen Saghatelyan, co-host of the Imnemnimi podcast who is currently held in pre-trial detention in the Armavir...
16:34
Iran threatens Israeli nuclear sites should its own be attacked
Iran could review its nuclear doctrine, says a senior Iranian Revolutionary Guards commander, according to state media agency Tasnim....
16:11
Mkhitaryan calls chance for Inter to clinch Serie A title 'crazy' and 'historic'
Henrikh Mkhitaryan feels that the chance for Inter Milan to clinch the Serie A title against AC Milan is “crazy” and...
15:35
Russian-Turkish monitoring center in Karabakh to close down
The joint Russian-Turkish monitoring center in Nagorno-Karabakh will cease its operations, Turkish National Defense Ministry...
15:06
Rep. Eshoo: We must not wait another century to hold Azerbaijan accountable for crimes against Armenians
The United States must not wait another century to hold Azerbaijan accountable for its ethnic cleansing in Nagorno-Karabakh...
14:31
Protest to 'stop' Pashinyan held outside Armenian government
A group of people led by activist Vahagn Chakhalyan on Thursday staged a protest outside the Armenian government building in central Yerevan,...
13:55
Artsakh's entire cultural heritage at risk of destruction, expert warns
April 18 is observed annually as the International Day for Monuments and Sites, whose establishment was approved by the 22nd UNESCO General...
13:30
GRECO calls for stronger oversight and accountability in top executive functions and police in Armenia
The Council of Europe’s Group of States against Corruption (GRECO), in a report published today, calls on Armenia to pursue its efforts to...
12:58
U.S. State Dept comments on withdrawal of Russian peacekeepers from Artsakh
The withdrawal of Russian peacekeepers from Nagorno-Karabakh (Artsakh) is yet another indication that Russia “is not a trustworthy...
12:36
Withdrawal of Russian peacekeepers from Artsakh not a surprise, expert says
The withdrawal of Russian peacekeepers from Artsakh (Nagorno-Karabakh) is no surprise, says analyst Sergei Melkonian, a research fellow at...
12:13
Protesters briefly block street in central Yerevan
A group of protesters briefly blocked Abovyan Street near the Yeritasardakan subway station in central Yerevan on Thursday morning. Police...
11:35
Conference in Antelias to address Azerbaijan's genocidal acts against Artsakh Armenians
Under the auspices of His Holiness Catholicos Aram I, the Cilicia Analytical Platform will host a pan-Armenian conference titled...
11:15
Activist Samvel Vardanyan released on bail, placed under house arrest
Activist Samvel Vardanyan, an Armenian government critic who was detained after confronting a pro-government MP on Monday, has been released on...
11:00
Rep. Sherman calls for expanded U.S. assistance for Artsakh Armenians
Rep. Brad Sherman (D-CA) - who spearheaded the first U.S. aid package to Artsakh in 1998 - stressed the importance of expanding assistance to...
17:14
Pashinyan meets with Voskepar residents
Armenian Prime Minister Nikol Pashinyan on Wednesday met with residents of Voskepar, a village in Tavush Province, to assure them that the...
16:35
Official: Decision on peacekeepers’ pullout from Karabakh made by top leadership of Azerbaijan, Russia
The decision to withdraw Russian peacekeepers from Nagorno-Karabakh was made jointly by the top leadership of Azerbaijan and Russia, TASS...

Follow us and get updates!

Most popular articles

{"core.blocks.header.spell_message1":"Selected mistake: ","core.blocks.header.spell_message2":"Send a message about the mistake?"}