Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR PROVIDING A SECRET UNIQUE KEY FOR A VOLATILE FPGA
Document Type and Number:
WIPO Patent Application WO/2020/099718
Kind Code:
A1
Abstract:
The present disclosure describes a method for providing a secret unique key for a volatile FPGA. The method uses layers of encryption with different and independent keys and the possibility to store auxiliary data in the configuration memory. The configuration may be stored in a bit-file protected using hardwired bit-file encryption offered by modern off-the-shelf FPGAs. The configuration includes a security block which has an embedded group key that is, in turn, used for protecting the auxiliary data. In the beginning, the auxiliary data may include a specific field with null identifier, which indicates that the device has not been initialized. During the initialization, the device generates a unique key and sets the field to specific identifier, which indicates that the device has been initialized, and replaces the original auxiliary data in the non-volatile configuration memory with a new auxiliary data constructed from these values. During normal operation this key is fetched from the auxiliary data and used to build a root-of-trust.

Inventors:
JÄRVINEN KIMMO (FI)
TOMMISKA MATTI (FI)
Application Number:
PCT/FI2019/050803
Publication Date:
May 22, 2020
Filing Date:
November 12, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
XIPHERA OY (FI)
International Classes:
G06F21/76; H04L9/08; H04L9/32
Foreign References:
US20150100793A12015-04-09
GB2513265A2014-10-22
Other References:
PARRINHA DIOGO ET AL: "Flexible and low-cost HSM based on non-volatile FPGAs", 2017 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), IEEE, 4 December 2017 (2017-12-04), pages 1 - 8, XP033313031, DOI: 10.1109/RECONFIG.2017.8279795
KYLE WILKINSON: "Using Encryption and Authentication to Secure an UltraScale/UltraScale+ FPGA Bitstream", 1 January 2018 (2018-01-01), XP055662649, Retrieved from the Internet [retrieved on 20200128]
Attorney, Agent or Firm:
LEITZINGER OY (FI)
Download PDF:
Claims:
CLAIMS

1. A method for providing a secret unique key for a volatile FPGA, wherein the method comprises

programming the FPGA with a bit-file to implement a security IP block that embeds a value for a group key and a default value of an initialization state indicator, wherein

the bit-file has been encrypted with a bit-file encryption that is decrypted with a hardwired decryption module embedded on the FPGA, and/or

the group key has been obfuscated within the bit-file, and

wherein the default value represents an uninitialized state where no secret unique key has been generated before; and,

with the security IP block implemented on the FPGA,

retrieving a value of a data record from a non-volatile memory, wherein the data record has been encrypted and authenticated with a key derived from the group key and represents values of the secret unique key and the initialization state indicator;

decrypting the value of the data record with the key derived from the group key;

determining an initialization status on the basis of the retrieved value of the initialization state indicator, the initialization status being selected from a list comprising at least the uninitialized state and an initialized state where a secret unique key has been generated before; and

if the determined initialization status represents the uninitialized state, generating a new value for the secret unique key,

sending a specific value derived from the new value of the secret unique key to be received by an external validation system, waiting to receive a validation signal for the specific value from the external validation system, wherein the validation signal indicates that the specific value has been successfully validated by the external validation system; and

if a signal validating the unique secret key is received, storing a new value of the data record to the non-volatile memory, wherein the said value represents the generated new value of the secret unique key and initialized state of the initialization state indicator, and wherein said value is encrypted and authenticated with the group key.

2. A method according to claim 1, wherein the generating of the new value for the secret unique key comprises

- generating the new value with a true random number generator (TRNG) programmed on the FPGA as a part of the security IP block.

3. A method according to claim 1 or 2, wherein the bit-file is stored in a non-volatile configuration memory, and the stored value of the secret unit key is stored separately from the bit-file on the same non-volatile configuration memory.

4. A method according to claim 3, wherein the FPGA and the non-volatile configuration memory implement an encrypted communications interface between each other, and the programming of the FPGA is performed via the encrypted communications interface.

5. A method according to claim 3, wherein the FPGA and the non-volatile configuration memory implement a non-encrypted communications interface between each other, and wherein protection of the group key is based on obfuscation.

6. A method according to any one of claims 3 to 5, wherein the non volatile configuration memory is integrated to the FPGA.

7. A method according any one of the preceding claims, wherein the initialization state indicator is in the form of a separate indicator field within the data record.

8. A method according any one of the preceding claims, wherein the generating of the new value of the secret unique key comprises generating a plurality of new values for a plurality of secret unique keys.

9. A method according any one of the preceding claims, wherein the method further comprises - encrypting and authenticating the specific value derived from new value of the secret unique key with a key derived from the secret public key before sending the specific value to be received by the external validation system. 10. A method according any one of the preceding claims, wherein the security IP block comprises a first block for initialization and a second block for normal operation after the initialization.

11. A method according any one of the preceding claims, wherein the non-volatile memory further stores other cryptographic keys and/or other data.

12. A non-volatile configuration memory for configuring a volatile FPGA, wherein the non-volatile memory contains a bit-file, wherein the bit-file is configured to program the FPGA to implement a security IP block that embeds a value for a group key and a default value of an initialization state indicator, wherein the bit-file is encrypted with bit-file encryption that is configured to be decrypted with a hardwired decryption module embedded on the FPGA, and/or

the group key is obfuscated within the bit-file, and

wherein the default value represents an uninitialized state where no secret unique key has been generated before, and

wherein the security IP block is further configured to:

retrieve a value of a data record from a non-volatile memory, wherein the data record has been encrypted and authenticated with a key derived from the group key and represents values of the secret unique key and the initialization state indicator;

decrypt the value of the data record with the key derived from the group key;

determine an initialization status on the basis of the retrieved value of the initialization state indicator, the initialization status being selected from a list comprising at least the uninitialized state and an initialized state where a secret unique key has been generated before; and

if the determined initialization status represents the uninitialized state, generate a new value for the secret unique key,

send a specific value derived from the new value of the secret unique key to be received by an external validation system, wait to receive a validation signal for the specific value from the external validation system, wherein the validation signal indicates that the specific value has been successfully validated by the external validation system; and

if a signal validating the unique secret key is received, store a new value of the data record to the non-volatile memory, wherein the said value represents the generated new value of the secret unique key and initialized state of the initialization state indicator, and wherein said value is encrypted and authenticated with the group key.

13. A device comprising a volatile FPGA and a non-volatile configuration memory according to claim 12, wherein the FPGA is configured to receive its configuration from the configuration memory.

14. A configuration program product comprising a bit-file characterized in that the bit-file is configured to program a volatile FPGA to implement a security IP block that embeds a value for a group key and a default value of an initialization state indicator, wherein

the bit-file is encrypted with a bit-file encryption that is configured to be decrypted with a hardwired decryption module embedded on the FPGA, and/or

the group key is obfuscated within the bit-file, and

wherein the default value represents an uninitialized state where no secret unique key has been generated before, and wherein the security IP block is further configured to:

retrieve a value of a data record from a non-volatile memory, wherein the data record has been encrypted and authenticated with a key derived from the group key and represents values of the secret unique key and the initialization state indicator;

decrypting the value of the data record with the key derived from the group key;

determine an initialization status on the basis of the retrieved value of the initialization state indicator, the initialization status being selected from a list comprising at least the uninitialized state and an initialized state where a secret unique key has been generated before; and

if the determined initialization status represents the uninitialized state, generate a new value for the secret unique key,

send a specific value derived from the new value of the secret unique key to be received by an external validation system,

wait to receive a validation signal for the specific value from the external validation system, wherein the validation signal indicates that the specific value has been successfully validated by the external validation system; and

if a signal validating the unique secret key is received, store a new value of the data record to the non-volatile memory, wherein the said value represents the generated new value of the secret unique key and initialized state of the initialization state indicator, and wherein said value is encrypted and authenticated with the group key.

Description:
METHOD FOR PROVIDING A SECRET UNIQUE KEY FOR A VOLATILE FPGA

FIELD

The invention relates to volatile FPGAs, and in particular, to generating non-volatile unique cryptographic keys for such FPGAs.

BACKGROUND INFORMATION

Field Programmable Gate Arrays (FPGAs) are digital integrated circuits which can be programmed by a designer after manufacturing. The nature of this programming differs significantly from other programmable circuits (e.g. microprocessors) which rely on specific hardwired instruction sets and where programs are specific sequences of these instructions. FPGAs, on the other hand, contain an array of programmable logic blocks and programmable interconnections between them, which allow programming at the logic level and, hence, from a designer’s view point, FPGAs can be thought of as "programmable silicon".

The FPGA may be (re)programmed with a configuration file called bit- file, which describes the functions of the logic blocks and interconnections. When the bit-file is uploaded into the FPGA, it configures the FPGA with application logic that implements the functionalities required by the system. The bit-file itself may be a) stored into a non-volatile memory, such as Flash memory, on the same system or b) uploaded from external source. The system can be configured to implement multiple different functionalities by using different bit-files. The non-volatile memory may allow storing multiple bit-files at the same time and can be used also for storing auxiliary data used by any application logic running on the FPGA.

Most FPGAs on the market today are based on volatile technology, which means that an FPGA loses its state when the operation power is switched off. Next time when the power is turned on again, the FPGA returns to the original state described by the bit-file and it cannot return to the same state where it was before the power was turned off. This has severe consequences for using FPGAs as cryptographic root-of-trusts. In particular, any of the secret keys and other sensitive data derived during the operation of the FPGA cannot be restored.

Modern FPGAs from major vendors allow using bit-file encryption, which means that the bit-file stored into the Flash memory may be encrypted with cryptographically strong methods. Bit-file encryption is based on a decryption module which is embedded hardwired part of the FPGA and includes a hardwired decryption key. The decryption module verifies the integrity of the bit-file and decrypts it before the FPGA configures itself with it to implement the application logic. Bit-file encryption prevents an adversary, who can read the contents of the Flash memory, from obtaining the actual bit-file or using the bit-file in an FPGA which does not have the same hardwired decryption key in its decryption module, unless the adversary can break the encryption which is assumed computationally impossible. Consequently, bit-file encryption can be used for preventing reverse engineering and for anti-counterfeiting purposes.

A cryptographic root-of-trust is a certain set of critical security functions and pieces of information that enable building trust on a device. A root- of-trust allows, for example, a device to securely authenticate itself to other parties or to perform various other cryptographic functionalities and protocols. Ultimately, a root-of-trust requires the device to have a secret unique key that must be embedded into the device so that it cannot be obtained or modified by any unauthorized party (an adversary). This secret unique key (or other cryptographic keys derived from it) allows building various security protocols.

However, in practice, manufacturing processes of mass-market products may require that all devices are manufactured the same way. Thus, each device may have to have exactly the same bit-file and possible auxiliary data written into the configuration memory during manufacturing. At the same time, it may be desirable that the devices can be built from off-the-shelf components; that is, the root-of-trust can be constructed from FPGAs and the Flash memories that are on the market today. Additionally, the use of other components besides the FPGA and Flash memory may not be desirable because it adds costs of the device. These aspects create a conflict with the requirement of having a secret unique key for every device.

BRIEF DISCLOSURE

An object of the present disclosure is to provide method for providing a secret unique key for a volatile FPGA so as to alleviate the above disadvantages. The object of the disclosure is achieved by a method which is characterized by what is stated in the independent claims. The preferred embodiments of the disclosure are disclosed in the dependent claims.

A method according to the present disclosure uses layers of encryption with different and independent keys and the possibility to store auxiliary data in the configuration memory to overcome the aforementioned obstacles. The configuration may be stored in a bit-file protected using hardwired bit-file encryption offered by modern off-the-shelf FPGAs. The configuration includes a security block which has an embedded group key that is, in turn, used for protecting the auxiliary data. In the beginning, the auxiliary data may include a specific field with null identifier, which indicates that the device has not been initialized. During the initialization, the device generates a unique key and sets the field to specific identifier, which indicates that the device has been initialized, and replaces the original auxiliary data in the non-volatile configuration memory with a new auxiliary data constructed from these values. During normal operation this key is fetched from the auxiliary data and used to build a root-of-trust.

The method a) allows each device to have a secret unique key, b) allows each device to be configured with the same bit-file and to have the same auxiliary data stored to the configuration memory during manufacturing, and c) does not require any additional components besides an off-the-shelf FPGA and a non volatile configuration memory.

BRIEF DESCRIPTION OF THE DRAWINGS

In the following the invention will be described in greater detail by means of preferred embodiments with reference to the attached drawings, in which

Figures 1, 2, and 3 show simplified diagrams of a first embodiment of a basic FPGA system implementing a method according to the present disclosure;

Figure 4 shows an exemplary, simplified block diagram of the security IP block 74 of Figures 1,2, and 3; and

Figure 5 shows an exemplary, simplified state machine of a security IP block of a method according to the present disclosure.

DETAILED DISCLOSURE

The present disclosure describes a method for providing a secret unique key for a volatile FPGA. The method comprises programming the FPGA to implement application logic comprising a security IP block. The security IP block embeds a value for a group key and a default value of an initialization state indicator. The default value represents an uninitialized state of the FPGA where no secret unique key has been generated before.

A set of method steps are then performed with the security IP block implemented on the FPGA. The security IP block retrieves a value of a data record from a non-volatile memory. The data record has been encrypted and authenticated with a key or keys derived from the group key and represents values of the secret unique key and the initialization state indicator. The security IP block decrypts the value of the data record with the key derived from the group key and determines an initialization status on the basis of the retrieved value of the initialization state indicator. The initialization status is selected from a list comprising at least a) the uninitialized state as discussed above and b) an initialized state where a secret unique key has been generated before.

If the determined initialization status represents the uninitialized state, the security IP block generates a new value for the secret unique key and sends a specific value derived from the new value of the secret unique key to be received by an external validation system. In this context, "a secret unique key" should be understood as "at least one secret unique key". In other words, the security IP block may generate a plurality of new values for a plurality of secret unique keys.

The new value for the secret unique key may be performed with a true random number generator (TRNG) programmed on the FPGA as a part of the security IP block, for example. The external validation system may be a server set up by the manufacturer, for example, and the security IP block may be configured to communicate with the external validation system via communication means accessible by the FPGA implementing the security IP block. The output from the TRNG may be further entered into a deterministic algorithm possibly together with additional data that varies between different devices (MAC address, public identifiers, outputs from physically unclonable functions, etc.).

The security IP block then waits to receive a validation signal for the specific value from the external validation system. The validation signal indicates that the specific value has been successfully validated by the external validation system. If the security IP block receives a signal validating the secret unique key, it stores a new value for the data record to the non-volatile memory. This new value represents the generated new value of the secret unique key and initialized state of the initialization state indicator. The security IP block encrypts and authenticates the generated new value of the data record with the group key.

In a preferred embodiment of a method according to the present disclosure, the FPGA is programmed with a bit-file stored in a non-volatile configuration memory. The data record holding the stored value of the secret unique key may be stored separately from the bit-file on the same non-volatile configuration memory. In addition to memory space for storing the bit-file, the configuration memory may further comprise additional memory space for storing auxiliary data. The data record may form a portion (or all) of this auxiliary data. Figures 1, 2, and 3 show simplified diagrams of a first embodiment of a basic FPGA system implementing a method according to the present disclosure. The physical components of the system are a volatile FPGA 11 and a non-volatile configuration memory 21 which may be a Flash memory, for example.

The FPGA 11 is (re)programmed with a bit-file 44, which describes the functions of the logic blocks and interconnections. When the bit-file 44 is uploaded into the FPGA 11, it configures the FPGA 11 with application logic 54 that implements the functionalities required by the system.

In Figures 1, 2, and 3, the bit-file 44 itself is stored on the configuration memory 21. The system may be configured to implement multiple different functionalities by using different bit-files. The configuration memory 21 may allow storing multiple bit-files at the same time. The configuration memory 21 is also able to store auxiliary data 64 used by any application logic 54 running on the FPGA 11.

As discussed above, modern FPGAs allow using bit-file encryption. The FPGA and the non-volatile configuration memory may implement an encrypted communications interface between each other, and the programming of the FPGA may be performed via the encrypted communications interface. In Figure 1, the bit-file 44 stored on the configuration memory 21 is encrypted with cryptographically strong methods. The bit-file encryption in Figure 1 is based on a decryption module 31 which is an embedded, hardwired part of the FPGA 11 and includes a hardwired decryption key / ¾ . The decryption module 31 verifies the integrity of the bit-file 44 and decrypts it before the FPGA 11 configures itself with it to implement the application logic 54. Figures 1, 2, and 3 depict encrypted data with a thick line and a key symbol in the lower right corner denoting the key that can decrypt it correctly. The bit-file encryption prevents an adversary who can read the contents of the configuration memory 21, from obtaining the actual bit-file or using the bit-file in an FPGA which does not have the same k b in its decryption module, unless the adversary can break the encryption which is assumed computationally impractical.

In Figures 1, 2, and 3, the auxiliary data 64 comprises the data record that represents values of the secret unique key and the initialization state indicator. The initialization state indicator may be in the form of a separate indicator field within the data record. For example, the data record in the auxiliary data 64 may include an identifier field f, which is set to a specific null value/o in the beginning, a key field set to null key value ko, and other relevant data for the method. The auxiliary data 64 may be protected with a group key k g . In the context of the present disclosure, the term 'protected' means that the confidentiality and integrity of the data are both ensured with cryptographic techniques. The cryptographic keys for these are derived from a common seed key mentioned in the same context.

Alternatively, or in addition, the value of the secret unique key itself may serve as the initialization state indicator. A predetermined value of the secret unique key may be stored on the data record, and this predetermined value may be used to indicate the unitialized state, i.e. that a secret unique key has not been generated before.

Figures 1 and 2 also show an external validation system 94. The external validation system 94 represents a trusted external party, e.g. the manufacturer, who knows both k b and k g . The manufacturer is not a component on the device as everything else depicted in the Figures 1, 2, and 3. All FPGAs, which share the same bit-file encryption key k b , are called the batch. All devices, which share the same group key k g , are called the group. In the context of the present disclosure, the batch and the group may or may not be the same set of devices. fiNext, operation of the basic system as shown in Figures 1, 2, and 3 is discussed in more detail.

Figure 1 depicts the situation when the FPGA system in Figures 1, 2, and 3 is powered up for the first time after manufacturing. In Figure 1, a bit-file 44 and initial contents of the auxiliary data 64 has been written to the configuration memory 21. The same bit-file and initial contents of auxiliary data may be written to the configuration memory for every device during manufacturing and, therefore, they may be the same for all devices when the power is switched on for the first time.

First, in order to program the FPGA to implement application logic comprising the security IP block, the decryption module 31 receives the bit-file 44 from the configuration memory. If the decryption module 31 successfully verifies and decrypts the bit-file 44 with k b , then it configures the FPGA 11 with it. After this, the FPGA has a configuration with user-defined application logic 54 and a security IP block 74. The user-defined application logic 54 may be freely configured. The user-defined application logic 54 does not directly relate to the method according to the present disclosure and is therefore not discussed in further detail in this disclosure. The security IP block 74 embeds the group key k g and two specific identifier values/o and/i (e.g., bit 0 and bit 1, respectively) which indicate that the device has not or has been initialized, respectively. The Security IP block 74 includes also secure key storage, which may be left empty (0) in the configuration. This key storage is dedicated for the secret unique key ku

After the power-up, the auxiliary data 64 comprising the data record is retrieved from the configuration memory 21 to the Security IP block 74 either by the Security IP block 74 directly or via application logic 54. Because the Security IP block 74 has the group key k g , it can verify and decrypt the auxiliary data 64 and obtain the identifier and key from it. The Security IP block 74 may then determine the initialization status by comparing the identifier from the auxiliary data with the null value/o that is embedded in it. Because the data record in the auxiliary data 64 is still the original version that was written during manufacturing, this comparison returns 'true'. The initialization status thus represents the unitialized state and the Security IP block 74 starts an initialization process. In the context of the present disclosure, the term "initialization process" is intended to be understood as the method steps aiming to successfully generate, validate, and store a secret unique key for the FPGA.

Figure 2 shows the beginning of the initialization process. The Security IP block 74 generates a random secret unique key h (a A-bit random value, where A depends on the security level of the application; e.g., 128 or 256 bits). In order to derive h, the Security IP block 74 may comprise a true random number generator (TRNG), for example. The Security IP block 74 may then generate a new value for the data record in the auxiliary data 64. The security IP block 74 protects auxiliary data 64 updated with the new value of the data record by using the group key k g . The new value of the data record contains or embeds initialization state indicator indicating the initialized state (/v =f ] and the new value of the secret unique key h, as shown in Figure 2. The data record may further represents additional other cryptographic keys and/or other data.

Figure 2, the Security IP block 74 sends the secret unique key h to be received by the external validation system 94 (e.g. the manufacturer) which may store it into a list for all devices. For devices / = 1, . . . , n, this list could be, for example, the following list of tuples (1, k ], (2, ki), . . . , ( n , k n ). However, instead of communicating h, the FPGA system may also communicate some other values. In particular, the external validation system 94 may obtain a specific value derived from ki and not h itself. One notable example is that the device may compute a public key from h using a specific public key cryptosystem and reveal only the public value, while keeping the secret key h for itself and in the data record stored in the non-volatile memory.

The security IP block 74 may encrypt and authenticate the new value of the secret unique key (or the specific value derived from the new value) with a key derived from with either a shared secret key or a public key of the external validation system key before sending the specific value to be received by the external validation system. However, in embodiments where the first power-up can be assumed to occur in a safe environment, it may not be necessary to encrypt and authenticate the specific value sent to the external validation system 94.

The Security IP block 74 then waits to receive a validation signal from the external validation system 94. When the external validation system 94 informs that it has successfully received h, the updated value of the auxiliary data 64 is written into the configuration memory 21.

When the power is switched off in Figure 2, the FPGA 11 loses its configuration and all values derived during its previous operation. Hence, the FPGA 11 also loses the knowledge of the secret unique key h that was generated during the initialization process.

Figure 3 shows the situation at a second (or a subsequent power-up) after the FPGA system has been successfully initialized. After the next power-up, the FPGA system obtains the configuration shown in Figure 3. The difference compared to the original state after manufacturing depicted in Figure 3 is that the original contents of the auxiliary data 64 has been replaced by the new contents including the new value of the data record as described above. The difference in Figure 3 compared with the state after initialization process shown in Figure 2 is that the Security IP block 74 within the FPGA 11 does not have the secret unique key ki. Similar to Figure 2, the auxiliary data 64 is retrieved from the configuration memory 21 to the security IP block 74 in Figure 3. The security IP block 74 verifies and decrypts it and obtains the key ku The security IP block 74 compares the identifier and the embedded null identifier /o. Now, =/i because the device has been initialized and, consequently, the comparison returns 'false'. Hence, the security IP block 74 enters normal operation instead of initialization process. Throughout this disclosure, the term "normal operation" is used to refers to operation of the security IP block after a secret unique key has been successfully generated, validated and stored on the non-volatile memory. The "normal operation" may involve the security IP block communicating with the user-defined application logic, for example. The normal operation allows using h for cryptographic root-of-trust. The secret key his embedded into the security IP block 74 in a way that prevents the adversary from obtaining it. In particular, the normal operation prevents communication that was used for communicating the specific value derived from the secret unique key to the external validation system during the initialization process.

The security IP block 74 may be designed in a way that h, k g , or any cryptographic key material derived from them does not leak to an external adversary who can be either passively observing or actively tampering with the FPGA. Furthermore, it is also assumed that the bit-file encryption can resist attempts from such an adversary.

While the first embodiment in Figures 1, 2, and 3 uses of a security IP block with a TRNG, the method according to the present disclosure may also be implemented in the form of a second embodiment where the security IP block that does not include a TRNG. Because such a security IP block is not able to generate any true randomness, it is not able to derive a secret unique key . It can still derive pseudorandom values from any seed value (e.g., k g ), but they are not unique between different instances using the same seed (that is, between devices using the same configuration bit-file). The second embodiment may differ from the first embodiment only in the initialization process. In the second embodiment, when the Security IP block enters the initialization process, it first waits to receive a message from an external party (e.g. the manufacturer or other trusted external party) who knows k g . This message may include the secret unique key generated by the external party and protected with k g . That is, the message may contain a value of the data record to be used as (at least part of) contents of the new auxiliary data. When the security IP block receives the message, it verifies the authenticity of the message. If the verification is successful, the security IP block updates the auxiliary data in the configuration memory. In the second embodiment, there is no need to communicate hto the external validation system.

Further, while the first embodiment in Figures 1, 2, and 3 implements an encrypted communications interface between the FPGA 11 and the configuration memory 21, the FPGA and the non-volatile configuration memory may instead implement a non-encrypted communications interface between each other. This may be the case when an FPGA does not support bit-file encryption, for example. Thus, in a third embodiment, the FGPA does not have the hardwired decryption module and bit-file is stored on the configuration memory unencrypted. The security of this variation relies only on the hardness of accessing the contents of the configuration memory and on the difficulty of reverse-engineering the configuration and, specifically, k g from the bit-file. Hence, protection of the group key is based on obfuscation in the third embodiment.

In the first embodiment, the application logic 54 and the security IP block 74 are implemented with a single bit-file 44. However, in a fourth exemplary embodiment, the implementation of the security IP block comprises a first block for the initialization process and a second block for normal operation after the initialization. In other words, the first block is dedicated to perform the initialization process as discussed above and the second block is dedicated to be used in the normal operation. The manufacturer creates two bit-files: a first bit-file comprising the first block and a second bit-file comprising the second block. Then, the FPGA system may first be programmed with the first bit-file which executes the method up to the point shown in Figure 2. After this, the manufacturer may write the second bit-file but keep the contents of the auxiliary data 64 as it is after the initialization process. The second bit-file may then be used during the normal operation. The fourth exemplary embodiment allows saving of FPGA resources because the normal operation does not need to be supported in the first block and the initialization process in the second block. On the other hand, the potential savings in required FPGA resources come at the cost of maintaining two bit-files and updating the bit-file between the initialization process and the normal operation.

The above exemplary embodiments and the method according to the present disclosure more generally directly extend to other cryptographically relevant data used within the FPGA. The non-volatile memory may be used to further store other cryptographic key data and/or other data. Such data could be long-term secret keys, certificates, counters (for instance, to ensure uniqueness of nonces), etc. The data can be stored in the auxiliary data similarly as the secret unique key h and protected with k g . Different parts of the auxiliary data may also be protected with different keys. In that case, another key k j is generated either from k g or h or generated directly from the TRNG and protected either with k g or ki in the auxiliary data. The new key k j may be used for protecting another region of the auxiliary data. This enables, for example, delegating access to this part of the auxiliary data to another block in the same FPGA by transferring it the key to this part (that is, kj). In some embodiments, the non-volatile configuration memory is integrated to the FPGA. Some modern FPGA devices include non-volatile memory in an otherwise volatile device. If such non-volatile memory is available in the FPGA, the method may be used so that the auxiliary data (and possibly also the bit- file) may be stored within this internal non-volatile memory instead of the external configuration memory. This extension does not require any modifications to other parts of the method; that is, only the location of the auxiliary data is changed.

The present disclosure further discloses a non-volatile configuration memory and a configuration program product for implementing the above- discussed method for configuring a volatile FPGA, including the exemplary embodiments of the method as described above.

In an exemplary embodiment of a non-volatile configuration memory according to the present disclosure, the non-volatile configuration memory may be in the form of a physical memory component, such as a Flash memory component. The non-volatile configuration memory may be used in a device comprising the configuration memory and a volatile FPGA that is configured to receive its configuration from the configuration memory, for example. The non-volatile memory contains a bit-file, wherein the bit-file is configured to program the FPGA to implement a security IP block that embeds a value for a group key and a default value of an initialization state indicator. The default value represents an uninitialized state where no secret unique key has been generated before.

The security IP block is further configured to retrieve a value of a data record from the configuration memory (or other non-volatile memory), decrypt the value of the data record with the key derived from the group key, and determine an initialization status on the basis of the retrieved value of the initialization state indicator. The security IP block assumes that data record has been encrypted and authenticated with a key derived from the group key and represents values of the secret unique key and the initialization state indicator. The initialization status is selected from a list comprising at least the uninitialized state and an initialized state where a secret unique key has been generated before.

The security IP block is configured to generate a new value for the secret unique key, send a specific value derived from the new value of the secret unique key to be received by an external validation system, and wait to receive a validation signal for the specific value from the external validation system, if the determined initialization status represents the uninitialized state. The validation signal indicates that the specific value has been successfully validated by the external validation system.

The security IP block is configured to store a new value of the data record to the configuration memory (or said other non-volatile memory), if it receives a signal validating the unique secret key. Said new value of the data record represents the generated new value of the secret unique key and initialized state of the initialization state indicator, and is encrypted and authenticated with the group key.

In an exemplary embodiment of a configuration program product according to the present disclosure, the configuration program product is configured to program the FPGA to implement a security IP block that embeds a value for a group key and a default value of an initialization state indicator, wherein the default value represents a uninitialized state where no secret unique key has been generated before. The security IP block may be further configured to implement the method according to the present disclosure. For example, the security IP block may be the same as defined in reference to the non-volatile configuration memory according to the present disclosure.

The method according to the present disclosure, including the embodiments above, may be used in different applications.

One exemplary use of the method according to the present disclosure is that when a manufacturer sells the device to a customer, it may send the list of h for the purchased devices together with the physical devices to the customer. Hence, the customer can utilize the features provided by the root-of-trust based on the secret unique key ku However, if the manufacturer withholds h, then the root- of-trust can be used only by the manufacturer and this allows, for example, tracking the use of the devices.

Another example of the possible use cases is the following: if the device and a remote server both share the same h, they can run a challenge-response protocol where the server sends a challenge to the device who then generates a response depending on both the challenge and ku When the server receives the response from the device, it knows that it came from a legitimate source because generating the same response is impossible without knowing ku This disclosure describes a method for deriving and storing a unique cryptographic key (or keys) that can be used in a root-of-trust module and covers all root-of-trust or other cryptographic functionalities that can be built upon such secret keys; that is, the method is not tied to any specific root-of-trust functionality. In the following, some specific aspects related to the method according to the present disclosure are discussed in more detail.

A first specific aspect is cryptographic primitives. The method can be implemented with various cryptographic primitives. The primary requirements for protection are that they must ensure confidentiality and integrity of data under active adversaries. That is, an adversary who can read the data stored in the non volatile configuration memory shall not be able to find out the cryptographic keys: k b , k g , ki, or any secrets derived from them.

Any manipulation of the data by an active adversary tampering with the contents of the non-volatile configuration memory shall also not remain unnoticed or give an adversary any advantage in finding the secret keys. The decryption using k b is assumed hardwired into the FPGA and is not consider further here.

In the following, two examples are given for achieving these objectives. These are used particularly for protecting the auxiliary data (that is, ki], but they serve additional purposes also and can be used as part of any further application that builds on the method. Both examples are built on Encrypt-then-MAC (Message Authentication Code) scheme for authenticated encryption, but also MAC-then- Encrypt and Encrypt-and-MAC can be used with minor modifications. The following examples use separate encryption and authentication keys k e and k a , respectively. They are both derived from the secret unique key h via a cryptographically secure key derivation function (KDF). The examples are designed so that they use only one cryptographic primitive, in this case AES (Advanced Encryption Standard) and HMAC-SHA-256 (hash-based message authentication code, where SHA-256 is the cryptographic hash function) respectively, to save implementation area on the FPGA. Other instantiations are certainly possible, for example, using AES-GCM (Advanced Encryption Standard - Galois/Counter Mode).

In Example 1, the main cryptographic primitive is a block cipher. The following description assumes that the block cipher is Advanced Encryption Standard (AES) but, in principle, any secure block cipher could be used instead. AES is a block cipher that encrypts a 128-bit message block with either 128, 192, or 256 bit keys. The confidentiality requirement is ensured by encrypting h with AES by using an encryption key k e and a secure mode of operation such as Cipher-Block- Chaining (CBC) or Counter (CTR) mode. In the following, AES-128-CTR is considered without loss of generality. The CTR mode encrypts a message m by splitting it into 128-bit blocks mo, mi, . . . , m«-i, where M is the smallest multiple of 16 bytes that is larger than the length of the plaintext (in bytes), and by computing Ci = E ke {bi] ® m, for all i = {0, 1, . . . , M - 1}, (1) where E k is AES with the key k e , bi = bo+i, and ® is the bitwise exclusive- or (xor). Decryption is similar to Eq. (1), but c, and m, switch places. It is essential that the counter block h, is a nonce (that is, a value that is never reused) for one key and, hence, bo must be chosen either as a) a large random value or b) a counter so that bo is always one greater than the last h, of the previous encryption.

Integrity is ensured by computing an authentication tag T for S, which are all public public values (nonces, initialization vectors, etc.), and the ciphertext c = Co 11 ci 11 . . . 11 CM- I by using an authentication key k a and, for example, CMAC (Cipher-based Message Authentication Code). Verification of a ciphertext c and an authentication tag T, first, computes an authentication tag using c and k a and, then, compares and T . If they are the same, then verification is successful, otherwise it fails (c and/or T has changed).

Finally, the auxiliary data is formed by concatenating A = S \ \ Co \ \ ci \ \ . . 11 CM- I 1 1 T. The bit string A is then stored in the configuration memory. The encryption and authentication keys can be derived from h, for example, via a CMAC based KDF.

In Example 2, the main cryptographic primitive is any pseudorandom function (PRF) F [k, x). In the following, a PRF based on the hash-based message authentication code HMAC and HKDF (a KDF based on HMAC), are considered so that the hash function is SHA-256. If the length of m (as in Example 1) is £ bits, then an T-bit key is derived from HKDF by using k e as the key and a random salt from the TRNG. The ciphertext c is computed by xorring the obtained key with m. The authentication tag is computed simply with HMAC using k a as the key. The auxiliary data is constructed similarly as in Example 1: A = S | | c | | T. The encryption key k e and the authentication key k a are both derived from k g using HKDF.

Some implementation approaches for a security IP block for a method according to the present disclosure can be seen as a second specific aspect. Some exemplary details of the security IP block therefore are being discussed next. Figure 4 shows an exemplary, simplified block diagram of the security IP block 74 of Figures 1,2, and 3. In Figure 4, the security IP block 74 consists of four subblocks: a control block 107, a crypto IP block 117, a secure storage block 127, and a TRNG block 137. Control block 107 takes care of external and internal interface and controls the execution of operations of the other subblocks. It includes a finite state machine (FSM) discussed more closely later on in this disclosure. It also includes logic and wiring for implementing the internal interfaces between the subblocks and the external interface to the application logic 54. All internal interfaces are assumed secure.

Crypto IP block 117 implements the cryptographic primitives as discussed in reference to the first specific aspect. It may comprise a module for computing the cryptographic algorithm (that is, AES in Example 1 and HMAC-SHA- 256 in Example 2) on the cryptographic primitives and a control FSM for controlling this module so that it computes the actual cryptographic primitives for confidentiality and integrity. In order to minimize the footprint of the security IP block 74, a compact implementation of the cryptographic algorithm may be required. Literature includes many descriptions of compact FPGA-based AES implementations, but using a high-speed implementation may also be justifiable if high encryption/decryption speeds are needed for other functionalities later on. PRFs can be implemented from FPGA-based hash function implementations. It may require strong countermeasures against side-channel attacks. Such countermeasures are discussed in more detail later on in this disclosure.

The secure storage block 127 may store all values that are needed in the security IP block 74 to implement the method according to the present disclosure. It may split into two parts: one for volatile values and one for hardcoded values. The volatile part is only for storing temporary values and, hence, the values stored there can be lost, when the power is switched off, or are stored in the auxiliary data 64 of non-volatile configuration memory. In particular, the secret unique key h (and all keys derived from it) are stored in the volatile values. In this context, "hardcoded values" are values that are directly hardcoded to the configuration of the FPGA and, thus, they are restored every time when the FPGA is re-configured with the bit-file. In principle, these values can be stored so that they can be overwritten with new values during the operation of Security IP block 74, but there is no need for such a feature in the method and the rest of the disclosure assumes that they are static values. In particular, the group key k g (or values needed to compute it; see below) are stored in the hardcoded values. There are no strict restrictions for the actual techniques used to store values within the secure storage block 127 besides the requirements discussed above and, therefore, the storage can be implemented with flip-flops, embedded memory blocks, LUT memories, initial values, hardcoded wiring, etc., or with any combinations of them.

The TRNG block 137 is a component that generates truly random bits based on entropy that is extracted from truly random physical phenomena. An FPGA-based TRNG may be implemented, for example, by using ring-oscillator banks and the literature includes many instances of practical TRNG with different entropy sources.

Because the method may rely on the bit-file encryption of the FPGA that cannot be controlled by the implementer of the method, it may be important to provide further measures to prevent key leakage even in the case where the adversary breaks bit-file encryption and obtains the bit-file in clear. Obtaining the details of the actual configuration from a bit-file is assumed to be difficult. Nevertheless, the secret hardwired values (that is, the group key k g or values from which it is derived) of the secure storage which are hardcoded into the configuration should be hidden via obfuscation. In the following, some different strategies to obfuscate k g (or any other secret value) within the configuration is presented.

In order to obfuscate the value of the group key k g , it is preferably not stored in the bit-file as such. For example, the configuration may not have a hardwired k g , but instead a significantly longer seed value k g . The actual group key may then be computed from k g' by using a cryptographically secure compression function. This increases the bits that the adversary needs to find correctly: a mistake even in one bit in k g' would return a completely incorrect k g . fi

Further, the group key k g may be split using secret sharing into multiple shares /¾W for / = 1, . . . , s so that k g = 0f =1 k g W. That is, the group key k g is a bitwise logical exclusive-or (xor) of all shares. Hence, k g is never stored in the configuration as such.

In addition, the group key may be split into multiple blocks so that k g = k g 1 11 k g 2 11 . . . 11 k g b . Different blocks may be stored in different locations in the configuration. For example, some are wires hardwired directly to 0 or 1, some are initial values of registers, some are stored in initial configurations of embedded block memories, etc. The blocks are also distributed to different spatial locations within the configuration.

The above strategies may be used alone or they can be combined. As discussed in the fourth embodiment of the method according to the present application, the method is applicable even without bit-file encryption, when this obfuscation is assumed strong enough.

A third specific aspect is discussion on utilization of TRNG in a method according to the present disclosure. The following presents exemplary approaches for implementing the method with the TRNG as an FSM (finite state machine) that controls the high-level execution of the Control 107 of the Security IP block 74. Figure 5 shows an exemplary, simplified state machine of a security IP block of a method according to the present disclosure.

In Figure 5, the state machine comprises eight states (State 0 to State 7). The states are discussed in reference to the first embodiment as described in Figures 1, 2, and 3.

State 0 is a power-up state that the state machine enters at power-up. It performs necessary operations and checks for the Security IP block 74 to function properly. The Security IP block 74 may also perform the required operations to construct the group key k g from obfuscated data (e.g. as discussed above). When these are done, the state machine moves to State 1.

In State 1, the auxiliary data 64 is retrieved from the configuration memory to the security IP block 74. This can be done either via the application logic 54 or directly from the Security IP block 74. After a read acknowledgement, the auxiliary data 64 is available and the state machine moves to State 2.

In State 2, The Security IP block 74 verifies the integrity and decrypts the auxiliary data 64 using Crypto IP 117 and the group key k g . Consequently, it obtains f , e.g. in a manner described in the first embodiment. If =/o, the security IP block 74 knows that it boots up for the first time and it proceeds to the initialization process by moving to State 3; otherwise, it proceeds to the normal operation in State 7.

In State 3, the Security IP block 74 uses the TRNG 137 to generate a new ki. This may be done by reading random seed bits from the TRNG 137 to collect enough entropy to guarantee certain (e.g., 128-bit) security level. In practice, significantly more bits than the security level can be read in order to increase robustness against environmental changes because this is a one-time operation and, thus, not speed critical. After collecting the seed bits, the unique identity key ki is generated from the seed bits via the KDF (as defined in the discussion on the cryptographic primitives above, for example) and written into the secure storage block 127. When h is ready, the state machine moves to State 4. In State 4, the security IP block 74 communicates h or any specific values derived from it (e.g. a public key) to the manufacturer. This can be done, for example, by writing h to a register or memory location which can be accessed externally via the application logic 54. This location is preferably different from the normal storage of h within the secure storage block 127 in order to prevent leakage of ki during the normal operation. Then, the external validation system 94 may use appropriate commands to read h and once it has read it, acknowledge that the read was successful and the state machine proceeds to State 5.

In State 5, the Security IP block 74 generates new contents for the auxiliary data 64 by encrypting h and f =/i and by calculating the authentication tag (see discussion on the cryptographic primitives above). When every device of a group uses the same group key k g , encryption methods may require unique nonces (i.e., the same value should not be used in two different devices). Hence, the nonce is generated by reading random bits from the TRNG block 137. Because the nonce is long, it is extremely unlikely that the same nonce is used in different devices with practical production volumes. For example, with 96-bit nonces, the Birthday paradox tells that the probability for a collision of nonces becomes larger than 50 % only after 2 48 devices (or encryptions). The initial auxiliary data 64 does not have this challenge because its contents are the same for all devices.

When the new content of the auxiliary data 64 is ready, the state machine moves to State 6.

In State 6, the new content of the auxiliary data 64 is written into the configuration memory 21. This can be done either via the application logic 54 or directly from the Security IP block 74. After a write acknowledgement, the initialization process may be considered ready and the state machine may move to State 7.

In State 7, the security IP block 74 enters the normal operation. This state may include, for example, derivation of further keys from h for different purposes. This state is followed with further states which, then, implement the functionalities required from the cryptographic root-of-trust, which was initalized with the proposed method. They are no longer part of the method and, thus, not discussed further in this disclosure.

A fourth specific aspect is security rationale in the context of a method according to the present disclosure. A primary security objective of the method is that an adversary with or without physical access to a device shall not obtain the secret unique key h, which is the basis for the root-of-trust. A secondary security objective is that the adversary shall not be able to make the device to have another k without it being detected in the FPGA. These objectives mandate that also the group key k g must remain secret because if the adversary finds out k g from any device, then the adversary can read or manipulate the auxiliary data (that is, kf) of all devices of the group.

The method according to the present disclosure uses layered protection (defence-in-depth) in order to prevent the adversary from breaking the security objectives: a) the bit-file encryption of the FPGA with the bit-file encryption key k b , b) the difficulty of reverse-engineering the configuration and k g from the bit-file, and c) The protection of the auxiliary data with the group key k g .

These three layers are discussed below in some detail. Although not strictly speaking a part of the method, it is assumed that all further security functions and external communication with cryptographic keys derived from h and/or k g are aimed to ensure that these secrets do not leak to an adversary in order to the security objectives of the method to remain effective.

The first layer, i.e. the bit-file encryption, may be considered only as a barrier that slows down an adversary, not a full protection that prevents all attacks. Nevertheless, the effort that is required from the adversary is considerable and prevents attacks in most imaginable applications.

The second layer involves obfuscation of the configuration, i.e. increasing the difficulty of reverse-engineering the configuration. While it is possible to successfully reverse certain sections of the bit-stream, complete bit- stream reversal remains infeasible for the time being. BRAM (Block Random Access Memory) of the FPGA contents can be read and written. Thus, BRAMs should not be used for storing k g , at least alone.

The third layer, i.e. the protection of the auxiliary data, may involve countering for side-channel attacks. Every time an initialized device is powered up, it verifies and decrypts the auxiliary data 64 using the Crypto IP 117 and the group key k g . Hence, a way for an adversary to attack the device to find out k g is to repeatedly boot the device and record side-channel traces during the verification and decryption (State 2 in Figure 5). This threat can be counter-measured with at least two approaches.

First, the Crypto IP block 117 may include strong countermeasures against side-channel and fault attacks so that it is difficult for an adversary to attack the verification and decryption process. In practice, this may mean that these countermeasures significantly increase the number of traces (and the number of times the device needs to be booted).

Second, an artificial delay can be added to the boot-up process (e.g., to State 0 of Figure 5). The rationale behind this delay is that it hinders the adversaries’ efforts to collect side-channel traces. Because a trace is recorded during the operation of Crypto IP 117, the adversary needs to wait this delay every time for each trace. For instance, adding a delay of 10 seconds means that collecting 100000 traces has an additional delay of over 11 days. This delay can be random to make the adversary’s efforts even more difficult.

In general, these countermeasures should be such that they make attacking harder than the estimated combined difficulty of attacking the bit-file encryption and reverse-engineering which are out of the control of the device manufacturer and that would also reveal k g to a successful adversary.

It is obvious to a person skilled in the art that the method/system according to the present disclosure can be implemented in various ways. The invention and its embodiments are not limited to the examples described above but may vary within the scope of the claims.