atmel加密芯片atsha

上传人:san****019 文档编号:83462173 上传时间:2019-02-27 格式:PPT 页数:29 大小:3.68MB
返回 下载 相关 举报
atmel加密芯片atsha_第1页
第1页 / 共29页
atmel加密芯片atsha_第2页
第2页 / 共29页
atmel加密芯片atsha_第3页
第3页 / 共29页
atmel加密芯片atsha_第4页
第4页 / 共29页
atmel加密芯片atsha_第5页
第5页 / 共29页
点击查看更多>>
资源描述

《atmel加密芯片atsha》由会员分享,可在线阅读,更多相关《atmel加密芯片atsha(29页珍藏版)》请在金锄头文库上搜索。

1、Atmel Crypto AthenticationTM ATSHA204,ATMEL 代理商 深圳,提供各方面的技术支持. 林先生 QQ :1085487223 邮箱:,V 1.0,什么是加密芯片 它本身具有十分安全的保密性,内部可以存储秘密数据,内置加密算法,通过安全的认证协议进行认证过程。 认证协议的作用 认证双方在不直接出示密钥的情况下,能够证明自己知道密钥。,散列函数Hash,Alan和Bell都是密码学教授,有一天,他们共同解决一个数学难题。在办公室里他们都没有想出来,却恰好在家里同时想出了答案。,Alan,Bell,你算出来是多少?,不,你先说。我怎么 又知道呢你算过呢?,你先说

2、。如果我说了,我 怎么知道是你算出来的。,散列函数Hash,不可逆的函数 知道函数F和c,很难反向运算得s。,例如,F是3的s次方后取前2到6的有效位数,共5位数为c。 随便取一个值,s=286,则3的286次方是2.8620607630655430965855314425431e+136 取前2到6的有效数字得,c=86206,散列函数Hash,我运算过后是 86206,恩,我已经知道你是 知道的。你不必说出 答案了。,把函数结果 告诉我吧。,散列函数Hash,SHA家族的五个算法,分别是SHA-1、SHA-224、SHA-256、SHA-384,和SHA-512,由美国国家安全局(NSA)

3、所设计,并由美国国家标准与技术研究院(NIST)发布;是美国的政府标准。 后四者有时并称为SHA-2。,散列函数Hash,sha256算法,散列函数Hash,sha256算法,SHA256(“apple“): 3A7BD3E2360A3D29EEA436FCFB7E44C7 35D117C42D1C1835420B6B9942DD4F1B SHA256(“apple “)(多了一个空格): E0F6F390C37556B5EB3292A63159AEA8 EC795A4A1D4F22A18ABB14AC7341508F SHA256(“Linux“): 4828E60247C1636F57B7

4、446A314E7F599 C12B53D40061CC851A1442004354FED,散列函数Hash,Hash算法与加密算法 Hash算法是不可逆的,也就是不能通过输出文本转化回原文本。不同文本经过Hash算法后可能输出相同的结果。 而加密算法是可逆的,每个加密算法都会有相应的解密算法。原文与密文一一对应。,HMAC 挑战响应,HMAC HMAC是密钥相关的哈希运算消息认证码(Hash-based Message Authentication Code),HMAC运算利用哈希算法,以一个密钥和一个消息为输入,生成一个消息摘要作为输出。 挑战响应 客户端发送一个消息作为挑战给服务器,服务

5、器使用事先存储好的密钥求MAC,发回客户端,这是响应。客户端根据响应来认证。,HMAC 挑战响应,挑战响应,ATSHA204,What can ATSHA204 do? Authenticate an Accessory Authenticate Firmware Securely Exchange Session Keys Secret Storage,ATSHA204,AT88SC0104 vs ATSHA204,ATSHA204 Security Features,Robust Crypto Algorithm SHA256 MAC, HMAC Advanced Multi-Level

6、HW Security Active shield over entire chip All memories internally encrypted Internal state consistency checking Security protocols hard coded Supply tamper protection Internal clock generation Secure test methods, no JTAG No debug probe points, no test pads Designed to Defend Against: Dumpster-divi

7、ng attacks Microprobe attacks Timing attacks Protocol attacks Fault attacks Power cycling Just as Secure as Smart Cards!,ATMEL,ATSHA204,256 bits long. ATSHA204利用这些key作为HASH消息源的一部分。用于MAC,CheckMac,HMAC, GenDig指令。 EEPROM的data zone的任意Slot可以存储Key。 (1) Diversified keys根据产品序列码生成key (2) Rolled Keys: 防止每次认证都

8、使用相同的key (3) Created Keys:根据已知的key产生新的key (4) Single-use Keys 使用有次数限制 (5) Password Checking 密码检查 (6) Transport Keys:传输key,Key,Accessory Authentication,Device,AVR or ARM Microprocessor,Accessory,ATSHA204,Random Number Generator,Key Storage,Secure Key Storage,SHA-256 Hash Calculation,SHA-256 Hash Engi

9、ne,Do They Match ?,No,Yes,Challenge,Response,Date / Time,Accessory Authentication Host Chip,Device,Challenge,Response,Accessory,ATSHA204,Secure Key Storage,SHA-256 Hash Engine,Random Number Generator,Secure Key Storage,SHA-256 Hash Engine,Do They Match ?,FIPS RNG,AVR or ARM Microprocessor,Stop,Conti

10、nue,ATSHA204,Firmware Authentication,Customer Board,AVR or ARM Microprocessor,ATSHA204,Random Number Generator,Key Storage,Secure Key Storage,SHA-256 Hash Calculation,SHA-256 Hash Engine,Do They Match ?,No,Yes,Challenge,Response,Date / Time,Secret Storage,Customer Board,AVR or ARM Microprocessor,ATS

11、HA204,Key Storage,Secure Key Storage,SHA-256 Hash Calculation,SHA-256 Hash Engine,Write,Read,Random Number Generator,Clear Data to Write,Clear Data to Read,Clear Data,Clear Data,Cryto Data,Cryto Data,Session Key Exchange,Same secrets in both ATSHA204s RNG ensures key uniqueness ATSHA204 MAC produces

12、 AES Key,AES,High Quality RNG,AES Key,AES,AES Key,Mutual Authentication,Uniformity across entire product lines Tools authenticate batteries before allowing use Charger Authenticates batteries before charging Batteries authenticate charger before charging Only valid products can be used together,Mana

13、ging Subcontractors,Chip Limits Subcontractor Actions Prevent unauthorized overbuilds OEM gives subcontractor limited qty of security devices Warranty Tracking Subcontractor logs mfr date, conditions, etc Personalize chip for use at one subcontractor only Match correct part with equipment/informatio

14、n at that subcon Control model numbers built by particular subcon Subcon only has authentication information for certain models Secure Programming Feature Protects secrets at third party subcontractors Atmel can securely program parts for high volume customers Customer: “We have more products sold u

15、nder our name that are not produced by us than what we produce”,CryptoAuthentication Kits and Support,Multiple Demo/Eval/Kit Boards Modular for compatibility with STK/EVK boards Source Code Library Code Speed customer development cycle Extensive Documentation Quick Start and Hardware User Guides App

16、lication Notes Demonstration / Evaluation PC Software Atmel Crypto Evaluation Studio (ACES),ATSHA204 USB Dongle,Small and Simple for Quick Demos Full PC GUI (ACES) support for device evaluation & experimentation Low cost,AVR Studio 5 Integration,Source Code Library Online, no NDA Supports most AVR and

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号