From Secure Memories to Smart Card Security
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
KeywordsSmart Card Finite State Machine Random Access Memory Flash Memory Security Feature
The authors gratefully acknowledge the contribution of Roel Maes from KU Leuven whose help in drawing figures for this chapter was as indispensable as it was timely and efficient.
- 2.A. Sharma, Semiconductor Memories: Technology, Testing, and Reliability, IEEE Press, 1997.Google Scholar
- 3.W. D. Brown, and J. E. Brewer, Nonvolatile Semiconductor Memory Technology: A Comprehensive Guide to Understanding and Using NVSM Devices, IEEE Press, 1997.Google Scholar
- 4.P. Cappelletti, C. Golla, P. Olivo, and E. Zanoni, Eds., Flash Memories, Kluver, Norwell, MA 1999.Google Scholar
- 5.L. Selmi and C. Fiegna, “Physical aspects of cell operation and reliability”, In Flash Memories, P. Cappelletti et al., Eds., Kluver, Norwell, MA, 1999.Google Scholar
- 7.B. Eitan, P. Pavan, I. Bloom, E. Aloni, A. Frommer, and D. Finzi, “A novel localized trapping, 2-bit nonvolatile memory cell”, IEEE Device Letters, 2002, pp. 543–545.Google Scholar
- 8.MirrorBit White Paper, AMD/Fujitsu Flash Memory, Publication number 25260.Google Scholar
- 9.NAND Flash Application Design Guide, Toshiba America Electronic Components, Inc., March 2004.Google Scholar
- 13.Security Features in NOR Flash Memories, ST Microelectronics. <www.st.com/flash>, September 2005 (accessed 15.05.2007).
- 14.Spansion Advanced Sector Protection, Spansion LLC. <www.spansion.com/application_notes/spansion_advsectprot_an_a0_e.pdf>, September 2002 (accessed 25.06.07).
- 15.Spansion S29WS256N vs. Intel 28F256L18, Spansion LLC., Sunnyvale, CA. <www.spansion.com/application_notes/S29WS256N_vs_28H256L18_AN_A0>, April 2006 (accessed 25.06.07).
- 16.KryptoTM Security for NOR Flash memories, ST Microelectronics. <www.st.com/flash>, October 2005 (accessed 15.05.07).
- 17.Flash NOR, Embedded Applications: Secure- KryptoTM,, ST Microelectronics. <http://www.st.com/stonline/products/families/memories/fl_nor_emb/fl_krypto.html>, 2005 (accessed 15.06.07).
- 18.Secure MMC, Samsung Semiconductor Global. <www.samsung.com/Products/Semiconductor/FlashCard/MMC/secure_mmc.htm>, 2006 (accessed 26.06.07).
- 19.P. Laackmann, and M. Janke, “Integral security from flash to ROM”, Infineon Technologies. <www.infineon.com/security>, 2003 (accessed 3.05.06).
- 20.A. Constantinou, “High capacity SIMs : a white paper”, Informa Telecoms and Media. <http://visionmobile.com/whitepapers.html>, 2006 (accessed 26.06.07).
- 21.P. Gutmann, “Data remanence in semiconductor devices”, Proceedings of the 10th USENIX Security Symposium, Washington, USA, August 13–17, 2001, <http://www.usenix.org>, 2001 (accessed 10.04.07).
- 23.R. Anderson, and M. Kuhn, “Low cost attacks on tamper resistant devices,” M. Loman et al. (Eds.), Security Protocols, Proceedings 5th International Workshop IWSP, Lecture Notes in Computer Science, vol. 1361, Springer-Verlag, 1997, pp.125–136.Google Scholar
- 24.O. Kommerling, and M. Kuhn, “Design principles for tamper-resistant smartcard processors”, Smarcard’99, Proceedings USENIX Workshop on Smartcard Technology, 1999, pp. 9–20.Google Scholar
- 26.M. Neve, E. Peeters, D. Samyde, and J.-J. Quisquater, “Memories: a survey of their secure uses in smart cards”, Second IEEE International Security in Storage Workshop, 2003, pp. 62–71.Google Scholar
- 27.S. Skorobogatov, “Low temperature data remanence in static RAM”, Cambridge Computer Lab. <www.cl.cam.ac.uk?TecReports/UCAM-CL-TR-536.pdf>, 2001 (accessed 15.02.04)