SMT007 Magazine

SMT-Jan2018

Issue link: https://iconnect007.uberflip.com/i/921680

Contents of this Issue

Navigation

Page 95 of 113

96 SMT007 MAGAZINE I JANUARY 2018 module or TPM) onto the relevant components or using processors that can be unambigu- ously identified via integrated security func- tions (trusted execution environment or TEE). There is a significantly more flexible option to retrofit infrastructures with an equivalent to ID cards simply by using a SD, microSD or USB interface and secure memory cards. Secure memory cards, such as those from Swissbit, consist of a flash memory chip, a smart card and a flash controller. Because a crypto element is used as the secure element, not only can communication be secured, but data can also be securely encrypted. This allows for trusted boot concepts to be implemented and for licenses to be secured. Flash memory with integrated AES encryptor can also be used to encrypt additional data memory (for example, conventional hard drives) within the system. The flash memory cards proposed for the authentication and encryption within the Industrial Internet of Things (IIoT) are already employed on a large scale in tap-proof mobile phones, police body - cams, and for the protection of patient data in medical technology. Trusted Platform Module as Retrofit Combining the identifier with a standard data memory holds much appeal, mainly because most of the components and embedded systems in the IIoT require memory anyway for operating systems and data. Implementa- tion is comparatively simple because memory interfaces are standardized and even middle- ware for the integration of TPM-requests can be supplied if required. One of the biggest challenges when creating secure IIoTs is retrofitting older systems and existing components. If they have USB or SD interfaces, these legacy systems can simply be equipped with an SD card as TPM with tamper- proof identities and integrated retrospectively into the security concept. Future-Proof An even greater challenge: During a prod- uct life cycle, security becomes more vulner- able, as attack methods become increasingly sophisticated. The quantum computer, which is expected to become available within the next few years, is a threat to the encryption process. Consequently, it will be easy to hack asymmetrical cryptography. It will be necessary to develop post-quantum cryptography (PQC), demanding algorithms that are resistant to attacks from quantum computers. Thus, prod- uct managers must consider the upgradeabil- ity of security solutions, not least because of the German IT Security Law, which requires the use of the most modern technology. As easily exchangeable modules, secure memory cards thus provide a solution for the PQC chal- lenge as well. SMT007 Hubertus Grobbel is the head of the security products department at Swissbit AG. Figure 1: Swissbit offers industry-standard SD and microSD cards with secure elements and specialist firmware that can be used as TPM.

Articles in this issue

Archives of this issue

view archives of SMT007 Magazine - SMT-Jan2018