Reviewing Hardware Security and Blockchains with Dr Debdeep Mukhopadyay — Professor, IIT-Kgp, at Genesis DevCon

Genesis DevCon
IBC Media
Published in
4 min readJan 19, 2020

In theory, blockchains are built to provide enhanced security and privacy for tech infrastructures given that they can serve as immutable, transparent ledgers. However, there are chances where security in blockchain-based applications can be compromised.

At Genesis DevCon, we invited Prof. Debdeep Mukhopadhyay from IIT-Kharagpur to join us for a tech talk on the opportunities and challenges in adopting hardware security for blockchains.

About the Speaker

Dr Debdeep Mukhopadhyay is a Professor at the Secured Embedded Architecture Laboratory (SEAL) in IIT — Kharagpur. He has published many papers in the cryptography domain and has conducted primary research into Computer Architecture and Fault Tolerance.

With his expertise in the field of cryptography and computer science, he conducted an engaging tech talk at Genesis DevCon. Here is a glimpse of all the topics that were covered.

Five salient points from Dr Mukhopadyay’s tech talk

Security issues in blockchain

Security in Blockchain is an aspect that is still evolving. It differs for private and public blockchains. However, on surveying the subject, security is defined by four important aspects:

  • Limiting access to information through confidentiality.
  • Assurance that the information is trustworthy & accurate with Integrity.
  • Guaranteeing the reliable access to information with the availability of data.
  • Ensuring data and user privacy.

Based on this, security issues can be addressed by using suitable crypto-primitives. In computer science, cryptographic primitives are well-established, low-level cryptographic algorithms that are used to build cryptographic protocols for computer security systems. These routines include but are not limited to, one-way hash functions and encryption functions.

A Blockchain-based IC Supply Chain Protection Scheme

In an IC Supply Chain, there are several points of time where there’s a need for transparency and traceability. From the point of time where the intellectual property (IP), the tools, standard cells, and models are procured, to the point where the ICs are deployed and monitored, blockchain has the potential to provide end-to-end tracking solutions to secure the concerned networks.

This can be achieved in the IC Supply Chain problem with a decentralized permissioned platform accessible by the supply chain ecosystem. Blockchain can be used for a global tamper-proof system for digitizing IC trade flow and tracking end-end shipments.

However, it is restricted to only digital transactions: blockchains in its original form falls short of providing authenticity of physical devices.

Authentication using Physically Unclonable Functions

A Physically Unclonable Function (PUF) is derived from a physical object that provides a physically-defined “digital fingerprint” output based on given input and set conditions. This digital fingerprint will serve as a unique identifier, most often for a semiconductor device such as a microprocessor. PUFs are usually implemented in integrated circuits and are typically used in applications with high-security requirements, more specifically cryptography.

On applying blockchains and PUFs to an IC supply chain, a verifier key is stored in a tamper-proof memory based off of a Security Credential Generator. This can ensure the beginning of securing the supply chain network in an end-to-end manner.

Here are the challenges that are being aided with respect to creation PUFs:

  • Model-building and side-channel resistant reliable PUF designs
  • Fault Tolerance of PUFs
  • Test Strategies for PUFs: metrics for assessing architectures of PUFs

Securing Blockchain Keys from Side-Channel Analysis

Blockchain keys are used for several vital cryptographic operations.

They are used for signature generations and are branded as the root of trust of the authenticity of blockchains. In many applications, the keys are stored and processed through hardware. However, they need to be secured against side-chain analysis.

In side-chain analysis or side chain attacks, an attacker may use information leaked from a side-channel resulting from physical implementations. This is called side-channel analysis (SCA) and it

may endanger the overall security of a system. However, blockchain keys — being one that is susceptible to side-chain attacks — need to be secured with strong cryptographic algorithms.

Blockchains and Hardware Wallets

Hardware wallets are essential for those operating within a blockchain. Given how the security of the blockchain is solely relying on the user who is responsible for keeping his funds safe, hardware wallets can ensure that private keys are secured. They need to be designed with suitable protections like cold storage, which means the keys never leave the device and are not exposed to the Internet. However, there must still be precautions taken against any side-channel attacks.

— — — — — — — — — — — — — —

Look out for more tech talks from Genesis DevCon.

Read all about how IoT and blockchain technology can enhance hardware security in several areas.

--

--

Genesis DevCon
IBC Media

Genesis DevCon is a blockchain developer conference that is bringing in the best experts in the field to India.