Intel

advertisement
Doug Cooper
Canada Country Manager
Intel Corporation
March 20, 2007
Mr. Cooper
My name is Andre Brisson and I am a founder of Whitenoise Laboratories Inc.
I want you to consider another “product line” and to do so I need to use a couple of examples, each
brought up with the utmost respect.
First, Whitenoise is the fastest encryption ever but it is truly characterized by the fact that it provides
continuous stateful authentication of persons and devices, inherent detection, and automatic denial of
network access to hackers and thieves.
I propose that Intel should “dust off” one of its older chips and utilize Whitenoise to create a SCADA
specific chip.
Analogy –
Moore’s law at some point will become obsolete simply because there will become a saturation point
when humans are not generating data at exponential rates any more.
Until then, it seems as if it is an expensive proposition to follow the Gillette model of product releases:
one blade, then two, then three, then four and now five blades to a razor! For chips it becomes daunting
to fathom the progression from chip, to dual cores, quad cores etc. etc. Margins become progressively
harder to maintain as the processors get more sophisticated and expensive.
I have attached an article from a couple of years ago when Texas Instruments surpassed Intel for the
first time in total chips sold. They dusted off an old chip and sold it to Nokia.
SCADA, Systems Control and Data Acquisition, networks absolutely dwarf in size what we consider
to be the “human networks”. A small SCADA network will have 150,000 endpoints. Machine to
machine communications control all of our critical infrastructure.
Andre Brisson
Whitenoise Laboratories Inc.
Executive Vice President
Business Development (Co-founder)
Phone: 604-724-5094 Fax: 604-873-2467
Email: brisson@lightspeed.ca
1
Because of the characteristics of Whitenoise, particularly its negligible processing overhead, its
incredible speed, and offset management, this security technology can be deployed in an archaic Intel
chip and easily outperform anything in the market today. INTEL could market a line of chips
particularly aimed at the SCADA markets. The cost to INTEL to rollout would be a fraction of the cost
of embarking on a next generation chip.
We can provide verification of all metrics and we have world class security experts you can reference.
http://www.wnlabs.com/advisors.html
There is much to learn about Whitenoise at http://www.wnlabs.com/technology.html.
I would like you to consider the potential of a paradigm that we have developed called Dynamic
Distributed Key Infrastructure. On the CD provided are several presentations. One has chip
characteristics and was a presentation used recently with another chip manufacturer.
California is looking towards utility companies monitoring energy consumption in homes so they don’t
have the rolling blackouts they recently ran into etc.
Their crypto needs for this project are listed below. Whitenoise can be used just for authentication, or
the same key can also be used for encryption, detection, authorization, DRM, RNG etc. As you read
the crypto requirements for this SCADA proposal, consider that Whitenoise satisfies all of their
requirements without doing a hybrid of symmetric keys with asymmetric key update (PKI). If you read
the attachment called SFI2_AES_DIVA.pdf you will see that we can accomplish the same thing but
with the Whitenoise process of distributed keys in turn distributing more session keys. This
tremendously simplifies the architecture, performance costs etc.
Thank you for any time you spend looking into Whitenoise technologies and a possible collaborative
effort on making chips for SCADA devices. This system can be demonstrated for you via SFI2 by
Lofty Perch (www.loftyperch.com ). And it eliminates problems of relying on time stamps etc.
Sincerely,
Andre Brisson CEO
www.whitenoiselabs.com
Andre Brisson
Whitenoise Laboratories Inc.
Executive Vice President
Business Development (Co-founder)
Phone: 604-724-5094 Fax: 604-873-2467
Email: brisson@lightspeed.ca
2
SCADA space example
Specs for utility project http://sharepoint.californiademandresponse.org/pct/default.aspx
Issues for Cryptographic Measures
The working group has identified the following issues concerning cryptographic measures:
The consensus of the group is that encryption of the broadcast
Confidentiality
vs. Authentication messages is not necessary for confidentiality purposes; only
authentication is necessary.
While encryption is not considered necessary for purposes of
Authentication
confidentiality, it has been suggested that it may require less
Methods
processing power to encrypt the entire message as a form of
authentication than to use another method of authentication and
integrity checking, e.g. a cryptographic hash.
Because the thermostat may pass through many hands: utility,
Symmetric vs.
manufacturer, installer, customer, etc., it seems likely that
Asymmetric
asymmetric keys would be very useful in this application.
Cryptography
However, the amount of processing required is orders of magnitude
higher, and the memory and code footprint required could raise
costs considerably.
Is has been suggested that there be multiple levels of keys, with the
Periodic Key
lowest level being symmetric and periodically changed using a
Changing
higher level key to avoid eavesdropping attacks. Considering how
infrequent the event messages are, however, it is not clear how
often the keys would need to be changed.
It has been suggested that it would be preferable to have multiple
Number and
Grouping of Keys sets of keys so that the number of customers affected by the
compromise of any particular key or set of keys would be limited.
It has been suggested that key sets be randomly distributed among
thermostats sold so that any attack could not be concentrated in a
geographic area. Naturally, the more key groups there are, the
more difficult it will be to manage the keys.
An appropriate mechanism for recovering from the compromise of
Recovery from
Andre Brisson
Whitenoise Laboratories Inc.
Executive Vice President
Business Development (Co-founder)
Phone: 604-724-5094 Fax: 604-873-2467
Email: brisson@lightspeed.ca
3
Key Compromise
one or more keys is necessary. The method must not involve travel
to the customer site. So far, the methods considered include using
multiple levels of keys as discussed above, or using a finite number
of keys preloaded in the thermostat.
Andre Brisson
Whitenoise Laboratories Inc.
Executive Vice President
Business Development (Co-founder)
Phone: 604-724-5094 Fax: 604-873-2467
Email: brisson@lightspeed.ca
4
Cryptographic Approaches Considered
The task force has considered the following general categories of cryptographic security solutions.
The first two fall in the category of “traditional cryptography”. Details of the actual solution will vary,
but this description should give the main ideas of each approach.
Option 1: Symmetric Session Keys with Asymmetric Update
This approach follows current best practices without consideration of the amount of processing
power or memory footprint required by asymmetric cryptography calculations.
a. Authentication and integrity are provided via an HMAC on each message. Alternatively,
this could be done by encrypting the entire message.
b. The HMAC is calculated using a symmetric Session Key and appropriately changing data
to protect against replay.
c. The Session Key is periodically changed and the new value broadcast at intervals,
encrypted using an Update Key.
d. The Update Key is asymmetric.
e. The Public Update Key is encoded in the thermostat when it is manufactured. This will
avoid concerns about the security of the Update Key in transit between the sender and the
manufacturer.
f. The Private Update Key is held by the sender.
g. There may be multiple sets of Update Keys, with the set used by any thermostat chosen
randomly when it is manufactured. To affect all thermostats, the sender must transmit
multiple messages.
h. There may be another level of asymmetric keys, the System Keys, used to change Update
Keys if they become compromised.
Option 2: Symmetric Key Combination
This approach uses only symmetric operations and would be based on methods commonly used
in military applications.
a. The manufacturer chooses a random number and codes it into the thermostat before
shipping. Call this value “A”.
b. The manufacturer also encodes a well-known fixed value “D”.
Andre Brisson
Whitenoise Laboratories Inc.
Executive Vice President
Business Development (Co-founder)
Phone: 604-724-5094 Fax: 604-873-2467
Email: brisson@lightspeed.ca
5
c. The manufacturer supplies a set of serial numbers and corresponding A values to the
sender.
d. The sender chooses a second random value for that thermostat. Call this value “B”. There
could be a different B value for each thermostat, or the thermostats could be grouped so that
many of them have the same “B”.
e. The installer phones the sender and provides a serial number.
f. The sender provides the installer with a “B” value to be entered into the thermostat.
g. The sender combines A and B to produce C. Any number of functions could be used to
perform the combination, the simplest being an XOR.
h. The sender authenticates each message using an HMAC (or similar mechanism) of the
message concatenated with D, using C as a key.
i. The sender must transmit a different message for each A/B/D combination. Grouping can
be achieved by varying any of the three values.
j. A possible variation would be to “force” B to achieve the same C for various groups. This
would potentially reduce the number of messages that must be broadcast.
Option 3: TESLA or Variation
Research has indicated that authentication in broadcast networks can be achieved with low
processing requirements using one-way chains of symmetric keys and periodic, secure time
synchronization (“Timed Efficient Stream Loss-tolerant Authentication” or TESLA) A
method using some variation of this scheme would be the third option.
Andre Brisson
Whitenoise Laboratories Inc.
Executive Vice President
Business Development (Co-founder)
Phone: 604-724-5094 Fax: 604-873-2467
Email: brisson@lightspeed.ca
6
Download