Campfire Stories: Test to Break or Test to Verify? (A32c)
Cost-sensitive markets like automotive and IoT increasingly rely on cryptographic security mechanisms to protect IP, privacy and safety. As security test lab we long had the mantra of testing to break these mechanisms. The scale and low margins of these markets call for a shift in efficient testing of cryptographic strength, without losing breadth in test coverage or significantly increasing testing complexity.
The presenters introduce some methods based on our years of experience in side channel and fault injection testing to make this possible. While SCA and FI are optional in FIPS 140 we expect the need for stronger protections as hardware attacks are on the rise. First, we cover the TVLA methods, as proposed by CRI, as a solution for cryptographic leakage testing. Then they will propose simple steps to include fault injection testing in the certification of validation process. Finally, they will discuss how these methods can be used in simulations by the manufacturer, in order to assess strength of security even before physical devices are produced.