Showing only posts by Cryptech Core Team. Show all posts.

Noisy Diode entropy source

The Cryptech project is using Avalanche Noise as a physical entropy source connected to the FPGA.

Avalanche breakdown is a physical process that occurs when current is forced backwards through a diode until it cannot hold back anymore. The diode will then begin conducting for a brief time until the …

An Open Crypto Chip

The Layer Cake Architecture Picture


layer-cake.jpg



Use Cases

  • RPKI/DNSSEC Signing
  • Transport VPNs
  • Routers and TCP/AO
  • Email
  • Federations, Identity Systems, SSO etc
  • Password Stretching & HMAC:ing
  • PGP and SSH Keys on a Stick
  • High Quality Entropy Randomness
  • A Communications Terminal Doing One Thing Well, Like Jabber w/o X11
  • HSM …

PKCS11 Proxy

The pkcs11-proxy is a way to tunnel PKCS11 over TCP (TLS). This page explains how to build and install PKCS11 proxy on the novena. There are various forks of this on github. We're going to use the SUNET fork since it support TLS-PSK for authentication out of the box. The …

CrypTech Workshop, Praha, 18 July 2015

Logistics

  • Hilton Hotel, the IETF venue
  • Amsterdam Room (this is a change)
  • 09:00 - 17:00

Introductions

  • The CrypTech Team
  • Others Who Have Contributed
  • Other Folk at the Meeting

Workshop Goals

  • Get an understanding of the project status and roadmap
  • Discus your requirements and expectations with the team
  • Get hands-on …

Project Management

v0.1 Resources

Human - 4-5 FTE

  • 0.5 Specifications
  • 1.0 FPGA Tools and Core
  • 1.0 Core Libraries and Interfaces
  • 0.5 QA & Docs
  • 0.5 Assured Linux Platform
  • 1.0 Coordination

Hardware

  • 4 Bunnie Boards
  • 2 Altera Eval Systems
  • Linux Platform

Travel & Overhead

  • Travel $5k/mo
  • Communications $1k …

Side Channel Attacks

Side Channel attacks on hardware are hard to avoid, detect and mitigate. But this should not stop us from trying. The CrypTech platform should be developed with side channel issues in mind. This page tries to collect information about relevant side channel attacks, mitigation strategies, side channel resistant design methods …

« newer articles | page 2 | older articles »