Professional Documents
Culture Documents
Anti-Tamper Memory (WP) 1
Anti-Tamper Memory (WP) 1
Executive Summary
Cypresss anti-tamper memory, based on nonvolatile static RAM (nvSRAM) technology, has unique features that protect SRAM and nonvolatile data from accidental or malicious intrusion. It also provides the fastest nvSRAM function. This white paper describes the tamper protect features implemented in the Cypress anti-tamper memory such as password protection, data destruction, functional destruction, and physical destruction. It is also possible to customize a combination of these data destruct features to suit application requirements.
In addition to the standard features mentioned above, nvSRAM offers the following anti-tamper protection features: Password protection to guard against accidental or malicious intrusion Upon tamper detection o o Protect data by preventing access to data, or Destroy data, destroy functionality, and/or physically damage
These features are unique in nvSRAM solutions and are faster than in most existing circuit solutions.
June 2, 2010
Page 1 of 5
[+] Feedback
Anti-Tamper Memory
Tamper Protection
Sensitive information such as cryptographic keys, sensitive algorithms, stored data, or intellectual property are stored in many applications such as Point of Sale (POS) terminals, Automatic Teller Machines (ATMs), credit card readers, networking (encryption), and energy metering. Attackers attempt to access these data by breaking into the systems. Therefore, these systems are designed to have tamper protection schemes. They are designed to detect tamper attempts and issue a signal to deactivate an ongoing transaction and prevent access or destroy any stored information before attackers access sensitive information. While tamper detection can be done immediately, it is a difficult task to delete stored data. Cypresss anti-tamper memory products address these concerns and provide the following tamper protect features: Password Protected Access Data Protection or Data Destruction on Tamper
Device Data, Destroy Device Functionality, and cause Physical Damage to the Chip
It is also possible to damage the chip after the memory is destroyed and the device does not function. In this configuration, the device applies the runaway condition to the circuits which perform the Store. This process takes 60 seconds. .
June 2, 2010
Page 2 of 5
[+] Feedback
Anti-Tamper Memory
A typical power up sequence in anti-tamper memory is illustrated in Figure 2. Figure 2 Power up sequence in Anti-Tamper Memory
Power up
nvSRAM bootup
Y Validate Password
Valid Password?
Y Y Toggle HSB (40us) Low High Low Factory Programmable Options Protect Data Data Destroy Functionality Silicon
Device Lock up
June 2, 2010
Page 3 of 5
[+] Feedback
Anti-Tamper Memory
Data Destruction using Software Commands In addition to the password features, Cypresss nvSRAM can be configured to destroy SRAM data based on controller commands. Most secure applications have a built-in tamper detect feature that triggers RAM erase signals for both internal and external RAMs in case of an attempted tamper. The external RAMs are then erased by applying negative voltage to the VCC pin of the RAM that discharges the memory cell charges. This process needs external components such as a negative voltage charge pump with its associated components, and is also slow (in the order of 100s of a millisecond to 1 second). In the case of anti-tamper memory, this process can be completed without any additional components and in a much shorter 5 ms. When tamper is detected, the controller must send out a specific seven address read sequence to the anti-tamper memory. At read speeds of 45 ns, this takes about 300 ns. At the seventh read, the memory initiates the data destruction sequence. Depending on user requirement, the controller can be programmed to send out the specific sequence to execute any one of the following data destructions: Destroy the data in the memory Destroy the data and destroy the memory functionality Destroy the data and functionality and also cause physical damage to the part
These three data destruction options are explained in the section Data Destruction upon Tamper Detection on page 2. As described earlier, the data destruction is done in 5 ms which is about 200 times faster than the conventional SRAM discharge method.
Summary
In addition to being the fastest nonvolatile SRAM solution, Cypresss anti-tamper memory provides unique tamper protect features. The devices anti-tamper response can be configured to suit specific application requirements. It has the password access feature and the capability to protect data or to destroy data, functionality, and can cause physical destruction on failure to enter the correct password. It can cause destruction through controller initiated commands. These features make the anti-tamper memory an ideal device in secure applications. The Cypress Anti-Tamper Memory can be customized to meet your application needs by utilizing any of the tamper protection options individually or concurrently. For ordering details contact antitamper@cypress.com.
June 2, 2010
Page 4 of 5
[+] Feedback
Anti-Tamper Memory
Cypress Semiconductor 198 Champion Court San Jose, CA 95134-1709 Phone: 408-943-2600 Fax: 408-943-4730 http://www.cypress.com
Cypress Semiconductor Corporation, 2010. The information contained herein is subject to change without notice. Cypress Semiconductor Corporation assumes no responsibility for the use of any circuitry other than circuitry embodied in a Cypress product. Nor does it convey or imply any license under patent or other rights. Cypress products are not warranted nor intended to be used for medical, life support, life saving, critical control or safety applications, unless pursuant to an express written agreement with Cypress. Furthermore, Cypress does not authorize its products for use as critical components in life-support systems where a malfunction or failure may reasonably be expected to result in significant injury to the user. The inclusion of Cypress products in life-support systems application implies that the manufacturer assumes all risk of such use and in doing so indemnifies Cypress against all charges. This Source Code (software and/or firmware) is owned by Cypress Semiconductor Corporation (Cypress) and is protected by and subject to worldwide patent protection (United States and foreign), United States copyright laws and international treaty provisions. Cypress hereby grants to licensee a personal, non-exclusive, non-transferable license to copy, use, modify, create derivative works of, and compile the Cypress Source Code and derivative works for the sole purpose of creating custom software and or firmware in support of licensee product to be used only in conjunction with a Cypress integrated circuit as specified in the applicable agreement. Any reproduction, modification, translation, compilation, or representation of this Source Code except as specified above is prohibited without the express written permission of Cypress. Disclaimer: CYPRESS MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Cypress reserves the right to make changes without further notice to the materials described herein. Cypress does not assume any liability arising out of the application or use of any product or circuit described herein. Cypress does not authorize its products for use as critical components in life-support systems where a malfunction or failure may reasonably be expected to result in significant injury to the user. The inclusion of Cypress product in a life-support systems application implies that the manufacturer assumes all risk of such use and in doing so indemnifies Cypress against all charges. Use may be limited by and subject to the applicable Cypress software license agreement.
June 2, 2010
Page 5 of 5
[+] Feedback