SlideShare a Scribd company logo
©ARM 2016
The importance of strong entropy
for IoT device security
Peter Aldworth
Embedded World 2017
Director systems technology, IoT
15/3/17
©ARM 20162
Importance of security
§  End node security is important in the Internet of Things
§  mbed provides a platform for IoT with security baked into the core
§  Entropy is a corner stone for security
©ARM 20163
What is entropy?
©ARM 20164
What is entropy/random?
§  Strong entropy ≈ true random data
§  true random data = the perfect 50/50 coin-flip
§  No information is available that can predict the future or tell about the past
©ARM 20165
What is entropy/random?
Tux the Penguin, the Linux mascot. Created in 1996 by Larry Ewing with The GIMP.
©ARM 20166
Rating entropy sources: Strong or weak?
§  Weak
§  Hardware Clock / MCU tick counter (Predictable)
§  Random seed compiled into binary
§  Timing / content of incoming network traffic
§  Reasonable
§  Device-specific seed in non-volatile storage
§  Strong
§  Hardware entropy source, e.g.True Random Number Generator (TRNG), in MCU
§  External TRNG on board
!
©ARM 20167
Importance of entropy
©ARM 20168
Bad entropy -> Bad security
§  All security protocols depend on good entropy somewhere in the chain
§  Public/Private key pairs / identities
§  Unique AES keys
§  Unique initialization vectors
§  And thus bad entropy also affects security of:
§  Session keys (e.g. SSL/TLS, SSH)
§  Encrypted files
§  The problem is that it still looks protected
and encrypted to the naked eye
Everybody can see that ECB
mode is bad if you use
it with a picture
©ARM 20169
What do these have in common?
2008: 2014:
2013:
The Last HOPE, Jacob Appelbaum, Dino Dai Zovi, Karsten Nohl
https://trailofbits.files.wordpress.com/2008/07/hope-08-openssl.pdf
https://threatpost.com/weak-random-number-generator-threatens-ios-7-kernel-exploit-mitigations/104757/
https://blog.cryptographyengineering.com/2013/09/20/rsa-warns-developers-against-its-own/
©ARM 201610
mbed OS
and strong entropy
©ARM 201611
mbed OS 5 device side software for Cortex-M
IoT brings a disruptive jump in complexity for embedded software requires a
platform OS. mbed OS is built to address these challenges in devices built for IoT
mbed
OS
Cortex-M
RTOS
kernel
Portable
drivers
Integrated
security
IoT
connectivity
Management
services
Development
tools
Developer
community
Partner
ecosystem
 Open collaboration across the ecosystem
accelerates IoT system development
©ARM 201612
§  Platform OS with IoT-
specialized features
§  RTOS core based on
CMSIS-RTOS
§  Cortex-M processors
and Radio IP supported
§  Industry leading device
to cloud security
§  Hardware enforced and
communications security
§  mbed TLS widely
adopted
§  Unified support for key
IoT connectivity
standards
§  Designed for integrated
radio SoCs and Modules
§  Leading innovation on
Thread and LoRa
mbed OS 5 at a glance
©ARM 201613
mbed security architecture
Cloud application platforms
Lifecycle security
Communication
security
Device security
mbed TLS
Connectivity
Client
Provisioning
Client
Update
Client
Connectivity
Service
Provisioning
Service
Update
Service
Device Hardware
mbed uVisor
mbed TLS
Prov TLCrypto TL Update TLConn TL
Deployment ManagementData Flow Management
mbed Cloud
mbed OS
©ARM 201614
Features:
§  SSL / TLS (SSL 3.0 up to TLS 1.2)
§  Extensive TLS Extension support
§  X.509 certificate handling
§  Abstraction layers
§  DTLS
Cryptographic blocks:
§  Symmetric encryption (AES, etc)
§  Hash algorithms (SHA-2, etc)
§  Public Key algorithms (RSA, Elliptic Curves, etc)
§  Random number generation (CTR_DRBG, etc)
mbed TLS - Features and Standards Supported
Full list of features and standard:
•  https://tls.mbed.org/core-features
•  https://tls.mbed.org/standard-compliance
SSL/TLS
Cipher Layer
(Sym
Encryption)
MD Layer
(Hash) Public Key Layer X.509 Modules
Random
Number Gen
(RNG)
Platform Abstraction
©ARM 201615
Delivering strong entropy in mbed OS
§  mbed TLS is the core library for security functions
§  mbed TLS uses mbed HAL to get access to hardware entropy sources
§  This relies on the developer selecting hardware targets that implement a strong
entropy source (TRNG)
The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM Limited
(or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be
trademarks of their respective owners.
Copyright © 2016 ARM Limited
©ARM 2016

More Related Content

What's hot

mbed Connect Asia 2016 mbed HDK From prototype to production
mbed Connect Asia 2016 mbed HDK From prototype to productionmbed Connect Asia 2016 mbed HDK From prototype to production
mbed Connect Asia 2016 mbed HDK From prototype to production
armmbed
 
mbed Connect Asia 2016 mbed Enabled
mbed Connect Asia 2016 mbed Enabledmbed Connect Asia 2016 mbed Enabled
mbed Connect Asia 2016 mbed Enabled
armmbed
 
mbed Connect Asia 2016 Developing IoT endpoints with mbed client
mbed Connect Asia 2016 Developing IoT endpoints with mbed clientmbed Connect Asia 2016 Developing IoT endpoints with mbed client
mbed Connect Asia 2016 Developing IoT endpoints with mbed client
armmbed
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
Linaro
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substations
Ryan O'Mara
 
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
Ryan O'Mara
 
Siprotec 5 v7.9 v8.0 DigitalTwin
Siprotec 5 v7.9 v8.0  DigitalTwinSiprotec 5 v7.9 v8.0  DigitalTwin
Siprotec 5 v7.9 v8.0 DigitalTwin
Ryan O'Mara
 
Protection relays and controls SIPROTEC 5 New Version V7.5
Protection relays and controls SIPROTEC 5 New Version V7.5Protection relays and controls SIPROTEC 5 New Version V7.5
Protection relays and controls SIPROTEC 5 New Version V7.5
Ryan O'Mara
 
Practical real-time operating system security for the masses
Practical real-time operating system security for the massesPractical real-time operating system security for the masses
Practical real-time operating system security for the masses
Milosch Meriac
 
Introduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisorIntroduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisor
Viller Hsiao
 
New SIPROTEC 5 Version 7.8 - Overview
New SIPROTEC 5  Version 7.8 - OverviewNew SIPROTEC 5  Version 7.8 - Overview
New SIPROTEC 5 Version 7.8 - Overview
Ryan O'Mara
 
mbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectormbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connector
armmbed
 
mbed Connect Asia 2016 Intro to mbed OS
mbed Connect Asia 2016 Intro to mbed OSmbed Connect Asia 2016 Intro to mbed OS
mbed Connect Asia 2016 Intro to mbed OS
armmbed
 
Emdg c10065-02-7600 relay-selection_guide_edition_7_en
Emdg c10065-02-7600 relay-selection_guide_edition_7_enEmdg c10065-02-7600 relay-selection_guide_edition_7_en
Emdg c10065-02-7600 relay-selection_guide_edition_7_en
nguyenvantrungnguyen
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun
 
2020 MCS Industrial AI-edge-computer
2020 MCS Industrial AI-edge-computer2020 MCS Industrial AI-edge-computer
2020 MCS Industrial AI-edge-computer
Grace Yang
 
LAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical OverviewLAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical Overview
Linaro
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
L. Duke Golden
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 

What's hot (20)

mbed Connect Asia 2016 mbed HDK From prototype to production
mbed Connect Asia 2016 mbed HDK From prototype to productionmbed Connect Asia 2016 mbed HDK From prototype to production
mbed Connect Asia 2016 mbed HDK From prototype to production
 
mbed Connect Asia 2016 mbed Enabled
mbed Connect Asia 2016 mbed Enabledmbed Connect Asia 2016 mbed Enabled
mbed Connect Asia 2016 mbed Enabled
 
mbed Connect Asia 2016 Developing IoT endpoints with mbed client
mbed Connect Asia 2016 Developing IoT endpoints with mbed clientmbed Connect Asia 2016 Developing IoT endpoints with mbed client
mbed Connect Asia 2016 Developing IoT endpoints with mbed client
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substations
 
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0Protection, Automation and Monitoring:  SIPROTEC 5 v7.9/v8.0
Protection, Automation and Monitoring: SIPROTEC 5 v7.9/v8.0
 
Siprotec 5 v7.9 v8.0 DigitalTwin
Siprotec 5 v7.9 v8.0  DigitalTwinSiprotec 5 v7.9 v8.0  DigitalTwin
Siprotec 5 v7.9 v8.0 DigitalTwin
 
Protection relays and controls SIPROTEC 5 New Version V7.5
Protection relays and controls SIPROTEC 5 New Version V7.5Protection relays and controls SIPROTEC 5 New Version V7.5
Protection relays and controls SIPROTEC 5 New Version V7.5
 
Practical real-time operating system security for the masses
Practical real-time operating system security for the massesPractical real-time operating system security for the masses
Practical real-time operating system security for the masses
 
Introduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisorIntroduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisor
 
New SIPROTEC 5 Version 7.8 - Overview
New SIPROTEC 5  Version 7.8 - OverviewNew SIPROTEC 5  Version 7.8 - Overview
New SIPROTEC 5 Version 7.8 - Overview
 
mbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectormbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connector
 
mbed Connect Asia 2016 Intro to mbed OS
mbed Connect Asia 2016 Intro to mbed OSmbed Connect Asia 2016 Intro to mbed OS
mbed Connect Asia 2016 Intro to mbed OS
 
s2000nano
s2000nanos2000nano
s2000nano
 
Emdg c10065-02-7600 relay-selection_guide_edition_7_en
Emdg c10065-02-7600 relay-selection_guide_edition_7_enEmdg c10065-02-7600 relay-selection_guide_edition_7_en
Emdg c10065-02-7600 relay-selection_guide_edition_7_en
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
2020 MCS Industrial AI-edge-computer
2020 MCS Industrial AI-edge-computer2020 MCS Industrial AI-edge-computer
2020 MCS Industrial AI-edge-computer
 
LAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical OverviewLAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical Overview
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 

Viewers also liked

Sustainably Connecting a Global Community
Sustainably Connecting a Global CommunitySustainably Connecting a Global Community
Sustainably Connecting a Global CommunityArm
 
SSL12 Entropy
SSL12 EntropySSL12 Entropy
SSL12 Entropy
Keith Vaugh
 
Principle of Maximum Entropy
Principle of Maximum EntropyPrinciple of Maximum Entropy
Principle of Maximum Entropy
Jiawang Liu
 
A Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation ProblemA Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation Problem
Erika G. G.
 
Information entropy
Information entropyInformation entropy
Information entropy
Oliver Reichenstein
 
Entropy
EntropyEntropy
The HPE Machine and Gen-Z - BUD17-503
The HPE Machine and Gen-Z - BUD17-503The HPE Machine and Gen-Z - BUD17-503
The HPE Machine and Gen-Z - BUD17-503
Linaro
 
Application of first law thermodynamics (yoga n zian)
Application of first law thermodynamics (yoga n zian)Application of first law thermodynamics (yoga n zian)
Application of first law thermodynamics (yoga n zian)qiebti
 
NetApp Insight 2013 Sessions
NetApp Insight 2013 SessionsNetApp Insight 2013 Sessions
NetApp Insight 2013 SessionsNetApp Insight
 
Marnus Koorts - Masters Project
Marnus Koorts - Masters ProjectMarnus Koorts - Masters Project
Marnus Koorts - Masters ProjectMarnus Koorts
 
NLP Secrets Seminar 2012 - Quantum Energy - 21062012
NLP Secrets Seminar 2012 - Quantum Energy - 21062012NLP Secrets Seminar 2012 - Quantum Energy - 21062012
NLP Secrets Seminar 2012 - Quantum Energy - 21062012
Grant Hamel
 
Heat transfer seminar
Heat transfer seminarHeat transfer seminar
Heat transfer seminar
amaljo joju e
 
IoT Server - Device Type Plugin
IoT Server - Device Type PluginIoT Server - Device Type Plugin
IoT Server - Device Type Plugin
Charitha Goonetilleke
 
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROPIoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
Open Mobile Alliance
 
Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of Devices
Kai Hudalla
 
Ahmed mahfouz[1] (1)
Ahmed mahfouz[1] (1)Ahmed mahfouz[1] (1)
Ahmed mahfouz[1] (1)ahmed mahfouz
 
Neuromarketing
NeuromarketingNeuromarketing
Neuromarketing
scotthk
 

Viewers also liked (17)

Sustainably Connecting a Global Community
Sustainably Connecting a Global CommunitySustainably Connecting a Global Community
Sustainably Connecting a Global Community
 
SSL12 Entropy
SSL12 EntropySSL12 Entropy
SSL12 Entropy
 
Principle of Maximum Entropy
Principle of Maximum EntropyPrinciple of Maximum Entropy
Principle of Maximum Entropy
 
A Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation ProblemA Maximum Entropy Approach to the Loss Data Aggregation Problem
A Maximum Entropy Approach to the Loss Data Aggregation Problem
 
Information entropy
Information entropyInformation entropy
Information entropy
 
Entropy
EntropyEntropy
Entropy
 
The HPE Machine and Gen-Z - BUD17-503
The HPE Machine and Gen-Z - BUD17-503The HPE Machine and Gen-Z - BUD17-503
The HPE Machine and Gen-Z - BUD17-503
 
Application of first law thermodynamics (yoga n zian)
Application of first law thermodynamics (yoga n zian)Application of first law thermodynamics (yoga n zian)
Application of first law thermodynamics (yoga n zian)
 
NetApp Insight 2013 Sessions
NetApp Insight 2013 SessionsNetApp Insight 2013 Sessions
NetApp Insight 2013 Sessions
 
Marnus Koorts - Masters Project
Marnus Koorts - Masters ProjectMarnus Koorts - Masters Project
Marnus Koorts - Masters Project
 
NLP Secrets Seminar 2012 - Quantum Energy - 21062012
NLP Secrets Seminar 2012 - Quantum Energy - 21062012NLP Secrets Seminar 2012 - Quantum Energy - 21062012
NLP Secrets Seminar 2012 - Quantum Energy - 21062012
 
Heat transfer seminar
Heat transfer seminarHeat transfer seminar
Heat transfer seminar
 
IoT Server - Device Type Plugin
IoT Server - Device Type PluginIoT Server - Device Type Plugin
IoT Server - Device Type Plugin
 
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROPIoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
 
Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of Devices
 
Ahmed mahfouz[1] (1)
Ahmed mahfouz[1] (1)Ahmed mahfouz[1] (1)
Ahmed mahfouz[1] (1)
 
Neuromarketing
NeuromarketingNeuromarketing
Neuromarketing
 

Similar to The importance of strong entropy for iot

3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
Ian Skerrett
 
Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017
Amazon Web Services
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
Justin Hayward
 
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
Open Mobile Alliance
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
Adam Doyle
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopNXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
Open Mobile Alliance
 
Nerospec IIoT Company Profile
Nerospec IIoT Company Profile Nerospec IIoT Company Profile
Nerospec IIoT Company Profile
Nerospec
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
Linaro
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
NRB
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoT
Eurotech
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
Michelle Holley
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
44CON
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 
Symposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedSymposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbed
Austin Blackstone
 
Eclipse IoT Overview
Eclipse IoT OverviewEclipse IoT Overview
Eclipse IoT Overview
Ian Skerrett
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
Ian Skerrett
 
Sagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-SiliconSagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-Silicon
chiportal
 

Similar to The importance of strong entropy for iot (20)

3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
 
Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
 
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
IoT projects in Eclipse Foundation using LwM2M (IoT World 2017 Workshop)
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 WorkshopNXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
NXP FRDM-K64F Platform with ARM mbed Demo - Edinburgh 2016 Workshop
 
Nerospec IIoT Company Profile
Nerospec IIoT Company Profile Nerospec IIoT Company Profile
Nerospec IIoT Company Profile
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoT
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
 
Symposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedSymposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbed
 
Eclipse IoT Overview
Eclipse IoT OverviewEclipse IoT Overview
Eclipse IoT Overview
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
Sagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-SiliconSagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-Silicon
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

The importance of strong entropy for iot

  • 1. ©ARM 2016 The importance of strong entropy for IoT device security Peter Aldworth Embedded World 2017 Director systems technology, IoT 15/3/17
  • 2. ©ARM 20162 Importance of security §  End node security is important in the Internet of Things §  mbed provides a platform for IoT with security baked into the core §  Entropy is a corner stone for security
  • 4. ©ARM 20164 What is entropy/random? §  Strong entropy ≈ true random data §  true random data = the perfect 50/50 coin-flip §  No information is available that can predict the future or tell about the past
  • 5. ©ARM 20165 What is entropy/random? Tux the Penguin, the Linux mascot. Created in 1996 by Larry Ewing with The GIMP.
  • 6. ©ARM 20166 Rating entropy sources: Strong or weak? §  Weak §  Hardware Clock / MCU tick counter (Predictable) §  Random seed compiled into binary §  Timing / content of incoming network traffic §  Reasonable §  Device-specific seed in non-volatile storage §  Strong §  Hardware entropy source, e.g.True Random Number Generator (TRNG), in MCU §  External TRNG on board !
  • 8. ©ARM 20168 Bad entropy -> Bad security §  All security protocols depend on good entropy somewhere in the chain §  Public/Private key pairs / identities §  Unique AES keys §  Unique initialization vectors §  And thus bad entropy also affects security of: §  Session keys (e.g. SSL/TLS, SSH) §  Encrypted files §  The problem is that it still looks protected and encrypted to the naked eye Everybody can see that ECB mode is bad if you use it with a picture
  • 9. ©ARM 20169 What do these have in common? 2008: 2014: 2013: The Last HOPE, Jacob Appelbaum, Dino Dai Zovi, Karsten Nohl https://trailofbits.files.wordpress.com/2008/07/hope-08-openssl.pdf https://threatpost.com/weak-random-number-generator-threatens-ios-7-kernel-exploit-mitigations/104757/ https://blog.cryptographyengineering.com/2013/09/20/rsa-warns-developers-against-its-own/
  • 10. ©ARM 201610 mbed OS and strong entropy
  • 11. ©ARM 201611 mbed OS 5 device side software for Cortex-M IoT brings a disruptive jump in complexity for embedded software requires a platform OS. mbed OS is built to address these challenges in devices built for IoT mbed OS Cortex-M RTOS kernel Portable drivers Integrated security IoT connectivity Management services Development tools Developer community Partner ecosystem  Open collaboration across the ecosystem accelerates IoT system development
  • 12. ©ARM 201612 §  Platform OS with IoT- specialized features §  RTOS core based on CMSIS-RTOS §  Cortex-M processors and Radio IP supported §  Industry leading device to cloud security §  Hardware enforced and communications security §  mbed TLS widely adopted §  Unified support for key IoT connectivity standards §  Designed for integrated radio SoCs and Modules §  Leading innovation on Thread and LoRa mbed OS 5 at a glance
  • 13. ©ARM 201613 mbed security architecture Cloud application platforms Lifecycle security Communication security Device security mbed TLS Connectivity Client Provisioning Client Update Client Connectivity Service Provisioning Service Update Service Device Hardware mbed uVisor mbed TLS Prov TLCrypto TL Update TLConn TL Deployment ManagementData Flow Management mbed Cloud mbed OS
  • 14. ©ARM 201614 Features: §  SSL / TLS (SSL 3.0 up to TLS 1.2) §  Extensive TLS Extension support §  X.509 certificate handling §  Abstraction layers §  DTLS Cryptographic blocks: §  Symmetric encryption (AES, etc) §  Hash algorithms (SHA-2, etc) §  Public Key algorithms (RSA, Elliptic Curves, etc) §  Random number generation (CTR_DRBG, etc) mbed TLS - Features and Standards Supported Full list of features and standard: •  https://tls.mbed.org/core-features •  https://tls.mbed.org/standard-compliance SSL/TLS Cipher Layer (Sym Encryption) MD Layer (Hash) Public Key Layer X.509 Modules Random Number Gen (RNG) Platform Abstraction
  • 15. ©ARM 201615 Delivering strong entropy in mbed OS §  mbed TLS is the core library for security functions §  mbed TLS uses mbed HAL to get access to hardware entropy sources §  This relies on the developer selecting hardware targets that implement a strong entropy source (TRNG)
  • 16. The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners. Copyright © 2016 ARM Limited ©ARM 2016