Email: Password: Remember Me | Create Account (Free)

Back to Subject List

Old thread has been locked -- no new posts accepted in this thread
Per Westermark
05/31/12 06:42
Read: 497 times

#187590 - Crypto keys
Responding to: Oliver Sedlacek's previous message
Physical access means that it may not be a good way to take over a huge number of units containing a specific chip.

But stealing crypto keys from a single chip can allow an attacker to make lots of interesting things.

Like cracking game consoles, allowing them to rip games.
Or allowing the extraction of encrypted movies (DVD, BD, ...)
Or allowing someone to tap into communication between other units using the same cryptographic methods and keys.
Or stealing credit card information from point-of-sales terminals.

For every chip out in the open, there will be developers who have suitable tools for interfacing.

And some chips may have backdoors that are accessible through normal firmware update channels - lots of equipment have over-the-air updates, or can update from USB thumb drives.

The important thing here is that this isn't the worlds only chip with security issues. A number of chips don't have explicit "backdoors", but have broken copy-protection implementations that gives the exact same end result - people can rip contents, or can modify the chip contents.

List of 17 messages in thread
have you seen this?      Richard Erlacher      05/30/12 22:31      
   Backdoor access      Oliver Sedlacek      05/31/12 05:15      
      What's the big deal?      Richard Erlacher      05/31/12 06:35      
      Crypto keys      Per Westermark      05/31/12 06:42      
         High security chips      Oliver Sedlacek      05/31/12 07:28      
            IP theft      Maarten Brock      06/01/12 07:20      
               as far as IP theft is concerned ...      Richard Erlacher      06/01/12 09:47      
   Its really      Jez Smith      06/01/12 09:22      
      Biggest problems is still processor copy-protection      Per Westermark      06/01/12 09:43      
         so Mr Evil Hacker gets his keys      Jez Smith      06/01/12 16:25      
            Mr Evil Hacker is most definitely busy      Per Westermark      06/02/12 10:33      
   Who writes that crap?      Andy Peters      06/04/12 10:32      
      Don't think so much about modification as in extraction      Per Westermark      06/04/12 13:54      
      The people who write that crap...      Jez Smith      06/04/12 15:08      
         c'mon, Jez!      Andy Peters      06/06/12 15:12      
      Never mind who writes it ....      Andy Neil      06/05/12 05:27      
         Right on!      Richard Erlacher      06/05/12 09:46      

Back to Subject List