iFocus.Life News News - Breaking News & Top Stories - Latest World, US & Local News,Get the latest news, exclusives, sport, celebrities, showbiz, politics, business and lifestyle from The iFocus.Life,

SecurID token decryption: single-chip secure network (Figure) - single-chip, electronics - electroni

101 28
"Computer security", the term covers today's computer users and computer industry, the key issues facing the complexity and severity. As more and more companies rely on ubiquitous network access, computer storage and retrieval of sensitive information, verification of the trusted user needs more and more pressing.

Even in personal life which, with banks, credit card and other sensitive financial data and related information will be private in some way inadvertently transferred to the Internet. While personal information is important, but the risk is continuously individuals in those services appear in the company's network environment. Tremendous amount of big business involved, so there will be criminal to spend a lot of time trying to secretly break into.

Current dismantling what exactly does the new surprise? Let us glimpse what the world is widely used to prevent computer intruders hardware token (hardwaretoken) should be a good choice. PlanetAnalog editors BillSchweber been looking for a fun little thing to be analyzed. Hard work pays off, he was a Boston-bound train from New York discovered a RSASecurID token. As the owner of lost property is not found in the car, according to the instructions, Bill is not the safety equipment is returned to the RSA, but the company will send it to Portelligent teardown.

This from RSASecurity company SecurID600 device is a small stand-alone tokens, can be hung on a keychain or put into the user's pocket. The device looks very simple function that generates a six-digit code, combine the user's PIN code and then the computer logged on to achieve two-level verification.

Although we have various forms of code, but alone they are vulnerable to attack. If a potential intruder know enough about you, such as your family dog's name plus your birthday a combination of these seem sound is actually very fragile. "Rover0859" on the surface is a random string of characters, but the computer can easily repeat offenders were on their break.

This is SecurID into play. Token shows the 6 digit code that is run through the hash function hardware token unique 64-bit symmetric key generated by the seed. The corresponding server to know each issued token key, and can be combined with the user through the inverse hash PIN code to authenticate users. Clearly, if this is a static string, then on the point of no use, because the break it is just a matter of time.

SecurID uses a small internal Battery Power supply, you can use the internal real time clock every 1 minute to generate a new code, the host-side solutions are changing simultaneously calculate the object code in order to maintain consistency with the token. The new code looks like a random hash function with the token key and nothing to do but powerful server host for every minute of the day there is only one correct answer.

Token from the string of code and real-time clock stamp seems to be code generated among the additional factors. But this has not within the scope of our discussion, let us come to the hardware it!

Other words, the token and the server in a one-minute intervals were generated and look forward to a new code, which will increase security to a standard password on user creation.

Bill sent dismantling of the gift seemingly simple, but soon showed its internal complexity. The Na Liangpian separate plastic case is not particularly difficult, but when I opened, pull out come is an epoxy sealed Board . Clearly, dismantling the first step had to suffer great difficulties.

CR2032 Button Battery And single-segment color LCD display is very clear, although the overall shape used (do not understand why not use black epoxy!), But other things are included in the epoxy resin. As previously encountered a similar problem, I went to try some good tips as far as possible to remove the circuit board, and for further understanding.

On the complexity of the basic components, the inside is not surprising places.
The only active circuit part is lead solder in circuit boards, a Chip . And about dozens of discrete passive components and crystals Oscillator Together, this 3.1x3.2mm die for real-time clock synchronization necessary functions, LCD control, key and code storage, and the achievement of token keys and other data-bit encryption, hash processing. Die tag does not show the manufacturer's name, may be mixed with custom devices.

Crystal from Switzerland MicroCrysal company basically is certainly the standard required for real-time applications 32.768kHz clock oscillation frequency. LCD is very simple, there are too many sources of potential suppliers, they are sealed by hot carbon / polyester flat ribbon cable connected to the circuit board.

Die itself contains a memory block to save the seed key, serial code and other programmable data. Some state machine code may be programmed into the memory, after hiding in the external contact adhesive labels for programming. Other chip area is all to the clock and the hardware hash logic. As the die is clear to use the large size of process technology, so the total number of gates is not high.

Perhaps most people find it strange that the apparent lack of self-destruction mechanism embedded memory. Portelligent has previously seen a more complex security micro-controller, as in the simple game controller, is shielding his private code. However, the lack of cryptographic expertise hacker, I can not predict the issue is how important the integrity of the token. PIN code properties and the roll cover, the solution from the practical application point of view is quite robust.

Small leather folder that the program is also an attractive part. The plating shield internal surface flush with the cap, it is possible to prevent radiation by sniffing out the LCD drive signals to show code tracking measures.

Any case, the device should be very low manufacturing cost and very effective, RSA can occupy two floors with its hardware authentication solutions for market share. If readers would like to learn more about this information, go to www.rsa.com Search the site password-encryption algorithm and a more detailed discussion.

Hardware for persons like me who, SecurID600 just one of many applications in a single-chip device Bale.
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time
You might also like on "Health & Medical"

Leave A Reply

Your email address will not be published.