diff options
author | jaseg <git@jaseg.de> | 2021-07-08 17:14:16 +0200 |
---|---|---|
committer | jaseg <git@jaseg.de> | 2021-07-08 17:14:16 +0200 |
commit | 83e8ccd65d1ed9c4a0892da3fecf92a83b21234d (patch) | |
tree | 3a240c15ba8382c8773f70059696bc256806f780 /paper | |
parent | 8a65ead1103fb3ac685cda97a333ec4c46110db5 (diff) | |
download | ihsm-83e8ccd65d1ed9c4a0892da3fecf92a83b21234d.tar.gz ihsm-83e8ccd65d1ed9c4a0892da3fecf92a83b21234d.tar.bz2 ihsm-83e8ccd65d1ed9c4a0892da3fecf92a83b21234d.zip |
Add comparison commercial conventional HSM / laptop, resources appendix
Diffstat (limited to 'paper')
-rw-r--r-- | paper/ihsm.bib | 9 | ||||
-rw-r--r-- | paper/ihsm_paper.tex | 16 |
2 files changed, 23 insertions, 2 deletions
diff --git a/paper/ihsm.bib b/paper/ihsm.bib index ce2a911..5c2d2c4 100644 --- a/paper/ihsm.bib +++ b/paper/ihsm.bib @@ -400,4 +400,13 @@ urldate = {2021-07-08}, } +@WWW{thales2021, + author = {Thales Group}, + publisher = {Thales Group}, + title = {Thales Luna HSM Product Family Overview Page}, + url = {https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms}, + urldate = {2021-07-08}, + date = {2021}, +} + @Comment{jabref-meta: databaseType:biblatex;} diff --git a/paper/ihsm_paper.tex b/paper/ihsm_paper.tex index 2932bd6..6b6109f 100644 --- a/paper/ihsm_paper.tex +++ b/paper/ihsm_paper.tex @@ -370,6 +370,12 @@ Given that for modern high core-count CPUs, power dissipation is mostly linear i applications performance is mostly linear in core count this severely limits the achievable performance in a traditional, hermetically sealed HSM. +This estimated performance discrepancy matches up with our observation. Vendor of conventional HSMs Thales reports +$\SI{20}{\kilo Ops\per\second}$ ECC signature operations on NIST Curve P-256 per device of their top-of-range ``Luna HSM +790''~\cite{thales2021}, which compares to be slightly more than half of the $\SI{36}{\kilo Ops\per\second}$ signing +operations that \texttt{openssl speed} in single-thread mode is able to do on an AMD Ryzen 7 PRO 4750U laptop CPU at a +power consumption of $\SI{2.0}{\watt}$ on the active core. + \subsection{Long-term Operation} Like with other HSMs, practical use may require an IHSM to continuously run for a decade or even longer. As with other @@ -437,7 +443,7 @@ accelerations large enough to cause a false alarm. To put the above relations into perspective, consider that at an angular frequency of $\SI{1000}{rpm}$, we can expect an IHSM's tamper sensor to measure an acceleration of about $\SI{100}{g}$. Even the strongest earthquakes rarely reach a -Peak Ground Acceleration (PGA) of $\SI{0.1}{g}$~\cite{yoshimitsu1990}. The highest measured PGA of the 2011 Tohoku +Peak Ground Acceleration (PGA) of $\SI{0.1}{g}$~\cite{yoshimitsu1990}. The highest PGA measured during the 2011 Tohoku earthquake was approximately $\SI{0.3}{g}$. Since earthquake vibrations are low-frequency and happen across a large geographic area, they nontheless dissipate a tremendous amound of mechanical power through an absolute acceleration that may seem low at first glance, but we can largely ignore them for the purposes of our tamper detection system. As @@ -862,8 +868,13 @@ secure hardware. \printbibliography[heading=bibintoc] +\appendix +\section{Source code and Design artifacts} -%%% FIXME remove appendix and work into text. +During our research on this paper, we have created a number of digital design artifacts including a 3D mechanical CAD +model of our prototype IHSM, schematics and PCB layouts for all of its PCBs including the prototype security mesh +monitor PCB as well as firmware and data analysis scripts for the experiments we ran on the prototype IHSM. All of these +digital artifacts as well as the sources to this paper are included in the git repository linked below. \center{ \center{This is version \texttt{\input{version.tex}\unskip} of this paper, generated on \today. The git repository @@ -871,4 +882,5 @@ secure hardware. \center{\censorIfSubmission{\url{https://git.jaseg.de/rotohsm.git}}} } + \end{document} |