Title :
Cryptographic Processors-A Survey
Author :
Anderson, Ross ; Bond, Mike ; Clulow, Jolyon ; Skorobogatov, Sergei
Author_Institution :
Comput. Lab., Cambridge Univ., UK
Abstract :
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-top boxes have pushed low-cost cryptoprocessors toward ubiquity. In the last five years, dedicated crypto chips have been embedded in devices such as game console accessories and printer ink cartridges, to control product and accessory after markets. The "Trusted Computing" initiative will soon embed cryptoprocessors in PCs so they can identify each other remotely. This paper surveys the range of applications of tamper-resistant hardware and the array of attack and defense mechanisms which have evolved in the tamper-resistance arms race.
Keywords :
cryptography; embedded systems; microprocessor chips; PIN processing; banking payment networks; crypto chips; cryptographic processors; cryptoprocessors; data-usage policy; fault analysis; military cipher machines; mobile phone credit; prepayment electricity; tamper-resistant hardware; token vending machines; trusted computing; Banking; Cryptography; Embedded computing; GSM; Hardware; Ink; Mobile handsets; Personal communication networks; Printers; TV; Cryptoprocessor; HSM; fault analysis; power analysis; security API; semi-invasive attack; survey;
Journal_Title :
Proceedings of the IEEE
DOI :
10.1109/JPROC.2005.862423