Vous êtes sur la page 1sur 5

Anti-Tamper Memory

Cypress Semiconductor White Paper


By Ravi Prakash

Executive Summary
Cypresss anti-tamper memory, based on nonvolatile static RAM (nvSRAM) technology, has unique features that protect SRAM and nonvolatile data from accidental or malicious intrusion. It also provides the fastest nvSRAM function. This white paper describes the tamper protect features implemented in the Cypress anti-tamper memory such as password protection, data destruction, functional destruction, and physical destruction. It is also possible to customize a combination of these data destruct features to suit application requirements.

Tamper Protection Overview


Electronic systems often carry sensitive information such as passwords, personal data, encryption keys, or IPs. Attackers attempt to access these data by breaking into systems. Secure systems are designed to enable authorized access through password entry, and take action to protect valuable data or destroy sensitive data on detection of tamper attempt. Examples of systems which need to protect data are security cameras or black box recorders where stored data should not be allowed to be modified and ATMs or POS systems where personal data should not be allowed to be accessed. However, it is often a challenge to destroy data stored in low power memory devices. Because low power SRAMs are designed to have low leakage currents, they are capable of holding data even with zero voltage on power pin. Therefore, removal or shorting of power to ground is not enough to corrupt the stored data. It requires the application of negative voltage on the power pin to drain the charges in the memory cell. An ideal anti-tamper memory must have a password entry feature and, in the event of tamper, it should be able to protect the data without allowing unauthorized access or self destruct, depending on the application requirement. It must also be fast so that the destruct process is completed before interruption or further tampering.

nvSRAM The Solution


nvSRAM is a fast nonvolatile memory with an SRAM interface. The SRAM interface gives the nvSRAM a very high speed read and write access (down to 20 ns) and enables the nvSRAM to be infinitely written or read. If the power goes down, the data held in SRAM is transferred to the nonvolatile elements integrated with each SRAM cell using the charge stored in a small capacitor. On power up, the data is automatically transferred back to the SRAM. The parallel transfer of data from SRAM to the integrated nonvolatile elements means that the STORE (transfer of SRAM data to nonvolatile elements) takes time equivalent to only one EEPROM write operation. Store operation and recall (transfer of NV data to SRAM) operation can also be done through software commands. Figure 1 nvSRAM - Fast, Easy, Secure

In addition to the standard features mentioned above, nvSRAM offers the following anti-tamper protection features: Password protection to guard against accidental or malicious intrusion Upon tamper detection o o Protect data by preventing access to data, or Destroy data, destroy functionality, and/or physically damage

These features are unique in nvSRAM solutions and are faster than in most existing circuit solutions.

Document No. 001-59690 Rev. *A

June 2, 2010

Page 1 of 5

[+] Feedback

Anti-Tamper Memory

Tamper Protection
Sensitive information such as cryptographic keys, sensitive algorithms, stored data, or intellectual property are stored in many applications such as Point of Sale (POS) terminals, Automatic Teller Machines (ATMs), credit card readers, networking (encryption), and energy metering. Attackers attempt to access these data by breaking into the systems. Therefore, these systems are designed to have tamper protection schemes. They are designed to detect tamper attempts and issue a signal to deactivate an ongoing transaction and prevent access or destroy any stored information before attackers access sensitive information. While tamper detection can be done immediately, it is a difficult task to delete stored data. Cypresss anti-tamper memory products address these concerns and provide the following tamper protect features: Password Protected Access Data Protection or Data Destruction on Tamper

Password Protected Access in nvSRAM


It is possible to configure the nvSRAM to provide password protected access. In this configuration, instead of performing the normal power up recall sequence on power up, the part waits for the user to enter a 5 byte password followed by an End Password Entry soft sequence. The End Password Entry soft sequence is a specific seven address read sequence. If you enter the correct password, the part completes the boot up sequence and is ready for the normal nvSRAM operations. If you enter the incorrect password three times or you do not enter the right password within a specified period of time, the part locks up or fills the SRAM memory with random data, as the application requirement may be. The part can be configured to additionally destroy the functionality and cause physical damage to the chip.

Changing the Password


The anti-tamper memory is shipped with a default 5 byte password. You can change the password through software control. To change the password, you must run a seven address sequence which initiates the password change process. Then, enter the current password followed by the new password twice.

Password Entry at Power up


On each power up, instead of performing the normal power up recall sequence, the part waits for the user to enter the password. After receiving the correct password, the part completes the boot up sequence and is ready for the normal nvSRAM operations. If you enter the incorrect password three times or you do not enter the right password within a specified duration of time, the part executes lock up or destruct sequence. The anti-tamper memory can be configured to protect the data by locking up the part on password failure. The part can be enabled by password on power cycling. The anti-tamper memory can be configured to destroy data in one of the following three methods: Destroy the data in the memory Destroy the data and destroy the memory functionality Destroy the data and functionality, and also cause physical damage to the part

These three methods are explained in the following sections..

Data Destruction upon Tamper Detection


Failure to enter the valid password within the required time indicates tamper and anti-tamper systems require that the existing data in the memory is destroyed.

Destroy Data in the Memory


This feature is for the lowest security requirement. The part is configured to destroy the data immediately on failure to enter the correct password. This is done by erasing all the SONOS cells and recalling the bogus memory in the SRAM and is executed in 5 ms.

Device Data and Destroy Device Functionality


As a higher level of protection for the security application, the part can be configured to destroy the stored data on failure to enter the password and, in addition, render the memory unusable. The data is destroyed and all the nonvolatile cells are erased, and the SRAM is filled with the bad data. Subsequently, the part performs a power on reset (POR) to render the part unbootable. The time taken to complete both data destruction and functional destruction is only 8 ms.

Device Data, Destroy Device Functionality, and cause Physical Damage to the Chip
It is also possible to damage the chip after the memory is destroyed and the device does not function. In this configuration, the device applies the runaway condition to the circuits which perform the Store. This process takes 60 seconds. .

Document No. 001-59690 Rev. *A

June 2, 2010

Page 2 of 5

[+] Feedback

Anti-Tamper Memory

A typical power up sequence in anti-tamper memory is illustrated in Figure 2. Figure 2 Power up sequence in Anti-Tamper Memory

Power up

nvSRAM bootup

Toggle HSB (40us) Low High Low

Wait for Password Entry

End Password Entry soft sequence?

Time out? (Min:100ms Max:25.6s)

Y Validate Password

Valid Password?

No. of attempts =3?

Y Y Toggle HSB (40us) Low High Low Factory Programmable Options Protect Data Data Destroy Functionality Silicon

Device Lock up

Destroy Data and Device not functional

Normal nvSRAM Bootup

Destroy Data and Device Lock up

Destroy Data and Physical Destruction

Document No. 001-59690 Rev. *A

June 2, 2010

Page 3 of 5

[+] Feedback

Anti-Tamper Memory

Data Destruction using Software Commands In addition to the password features, Cypresss nvSRAM can be configured to destroy SRAM data based on controller commands. Most secure applications have a built-in tamper detect feature that triggers RAM erase signals for both internal and external RAMs in case of an attempted tamper. The external RAMs are then erased by applying negative voltage to the VCC pin of the RAM that discharges the memory cell charges. This process needs external components such as a negative voltage charge pump with its associated components, and is also slow (in the order of 100s of a millisecond to 1 second). In the case of anti-tamper memory, this process can be completed without any additional components and in a much shorter 5 ms. When tamper is detected, the controller must send out a specific seven address read sequence to the anti-tamper memory. At read speeds of 45 ns, this takes about 300 ns. At the seventh read, the memory initiates the data destruction sequence. Depending on user requirement, the controller can be programmed to send out the specific sequence to execute any one of the following data destructions: Destroy the data in the memory Destroy the data and destroy the memory functionality Destroy the data and functionality and also cause physical damage to the part

These three data destruction options are explained in the section Data Destruction upon Tamper Detection on page 2. As described earlier, the data destruction is done in 5 ms which is about 200 times faster than the conventional SRAM discharge method.

Summary
In addition to being the fastest nonvolatile SRAM solution, Cypresss anti-tamper memory provides unique tamper protect features. The devices anti-tamper response can be configured to suit specific application requirements. It has the password access feature and the capability to protect data or to destroy data, functionality, and can cause physical destruction on failure to enter the correct password. It can cause destruction through controller initiated commands. These features make the anti-tamper memory an ideal device in secure applications. The Cypress Anti-Tamper Memory can be customized to meet your application needs by utilizing any of the tamper protection options individually or concurrently. For ordering details contact antitamper@cypress.com.

Document No. 001-59690 Rev. *A

June 2, 2010

Page 4 of 5

[+] Feedback

Anti-Tamper Memory

Cypress Semiconductor 198 Champion Court San Jose, CA 95134-1709 Phone: 408-943-2600 Fax: 408-943-4730 http://www.cypress.com

Cypress Semiconductor Corporation, 2010. The information contained herein is subject to change without notice. Cypress Semiconductor Corporation assumes no responsibility for the use of any circuitry other than circuitry embodied in a Cypress product. Nor does it convey or imply any license under patent or other rights. Cypress products are not warranted nor intended to be used for medical, life support, life saving, critical control or safety applications, unless pursuant to an express written agreement with Cypress. Furthermore, Cypress does not authorize its products for use as critical components in life-support systems where a malfunction or failure may reasonably be expected to result in significant injury to the user. The inclusion of Cypress products in life-support systems application implies that the manufacturer assumes all risk of such use and in doing so indemnifies Cypress against all charges. This Source Code (software and/or firmware) is owned by Cypress Semiconductor Corporation (Cypress) and is protected by and subject to worldwide patent protection (United States and foreign), United States copyright laws and international treaty provisions. Cypress hereby grants to licensee a personal, non-exclusive, non-transferable license to copy, use, modify, create derivative works of, and compile the Cypress Source Code and derivative works for the sole purpose of creating custom software and or firmware in support of licensee product to be used only in conjunction with a Cypress integrated circuit as specified in the applicable agreement. Any reproduction, modification, translation, compilation, or representation of this Source Code except as specified above is prohibited without the express written permission of Cypress. Disclaimer: CYPRESS MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Cypress reserves the right to make changes without further notice to the materials described herein. Cypress does not assume any liability arising out of the application or use of any product or circuit described herein. Cypress does not authorize its products for use as critical components in life-support systems where a malfunction or failure may reasonably be expected to result in significant injury to the user. The inclusion of Cypress product in a life-support systems application implies that the manufacturer assumes all risk of such use and in doing so indemnifies Cypress against all charges. Use may be limited by and subject to the applicable Cypress software license agreement.

Document No. 001-59690 Rev. *A

June 2, 2010

Page 5 of 5

[+] Feedback

Vous aimerez peut-être aussi