METHOD AND DEVICE FOR THE PROTECTION OF DATA INTEGRITY THROUGH AN EMBEDDED SYSTEM HAVING A MAIN PROCESSOR CORE AND A SECURITY HARDWARE MODULE

Information

  • Patent Application
  • 20170126701
  • Publication Number
    20170126701
  • Date Filed
    October 25, 2016
    8 years ago
  • Date Published
    May 04, 2017
    7 years ago
Abstract
A method for protecting data integrity through an embedded system having a main processor core and a security hardware module. The method includes the following: the main processor core generates transmit data, the security hardware module calculates a transmit message authentication code from the transmit data, the main processor core links the transmit data and the transmit message authentication code to form a transmit message, and the main processor core transmits the transmit message to a receiver.
Description
CROSS REFERENCE

The present application claims the benefit under 35 U.S.C. §119 of German Patent Application No. DE 102015221239.4 filed on Oct. 30, 2015, which is expressly incorporated herein by reference in its entirety.


FIELD

The present invention relates to a method for protecting data integrity through an embedded system having a main processor core and a security hardware module. The present invention also relates to a corresponding device, a corresponding computer program, and a corresponding storage medium.


BACKGROUND INFORMATION

In the field of IT security, the property of so-called functional safety is regarded as present if a system behaves in conformance with the expected functionality. Information security, in contrast, relates to the protection of the technical processing of information. Information security measures, in this terminological sense, are used to prevent unauthorized data manipulation or the divulging of information.


A message authentication code is used in this context to provide security concerning the origin of data or messages, and to check their integrity. For this purpose, first the sender and receiver agree on a secret key. The sender calculates a message authentication code for this key and for his message, and then sends the message and the message authentication code to the receiver. The receiver calculates the message authentication code for the received message using the key, and compares the calculated message authentication code to the received one. Agreement of the two values is interpreted by the receiver as a successful integrity test: the message was sent by a party who knows the secret key, and the message was not changed during the transmission.


German Patent Application No. DE 10 2009 002 396 A1 describes a method for protection against manipulation of a sensor and of sensor data of the sensor, and a sensor for this purpose, in which, in the context of authentication, a random number is sent from a control device to the sensor, and, for recognition of a manipulation of the sensor data, the sensor data from the sensor to the control device are provided with a cryptographic integrity protection, and, in order to prevent replay attacks, additional time-variant parameters are added to the sensor data, which the sensor data will send from the sensor to the control device with the integrity protection and the added time-variant parameters. Here, after the authentication of the sensor the random number, or a part of the random number, or a number obtained from the random number using a function, are used for the time-variant parameters.


SUMMARY

The present invention provides a method for protecting data integrity through an embedded system having a main processor core and a security hardware module, a corresponding device, a corresponding computer program, and a corresponding storage medium.


Through the use of a message authentication code, an embodiment of the present invention meets the security requirements of functional safety and information security equally, whereas until now information security and functional safety mechanisms have standardly been realized in specific fashion in order to meet the requirements of each—often using different, specially developed hardware.


Under the assumption that the error acquisition properties of a message authentication code can also ensure functional safety to an acceptable degree, according to the present invention the message authentication code can be used in the context of a functional safety mechanism. The implementation, proposed for this purpose, of the MAC generation and testing meets both functional safety and information security requirements.


For the purpose of better protection, here a security hardware module is used. Possible here is in particular a hardware security module (HSM) as specified by Robert Bosch GmbH, or a secure hardware extension (SHE) as specified by the manufacturer initiative software (HIS).


An advantage of the embodiment of the present invention is that the effects of the demands placed on the hardware modules through the use of the message authentication code are reduced. For this purpose, individual processing steps are individually assigned to the main processor core or to the security hardware module.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows the flow diagram of a transmit method according to a first specific embodiment of the present invention.



FIG. 2 shows the flow diagram of FIG. 1 with identification of new malfunctions relevant to functional safety.



FIG. 3 shows the flow diagram of a receive method according to a second specific embodiment of the present invention.



FIG. 4 shows the flow diagram of FIG. 3 with identification of new malfunctions relevant to functional safety.



FIG. 5 schematically shows a control device according to a third specific embodiment of the present invention.





DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

Specific embodiments of the present invention include two main designs (10, 30) for realizing the MAC processing.


The first design (10) is to route the data path through the main processor core (11) so that the data themselves cannot be damaged by the security hardware module (12). This module can use a copy of the data for the processing, but for the transmission the main processor core (11) should use data that cannot be modified or manipulated by the security hardware module (12). In this way, the functional safety properties of the main processor core (11) are maintained.



FIG. 1 shows this in the case of transmission: the main processor core (11) first produces (13) transmit data (14). The security hardware module (12) calculates (15) from these transmit data (14) a transmit message authentication code (16). The main processor core (11) links (17) the transmit data (14) and the transmit message authentication code (16) to form a transmit message (18), and, finally, transmits (19) this message to the provided receiver.



FIG. 2 also shows the remaining potential malfunctions: if the transmit message authentication code (16) is calculated (15) with errors (21), the receiver nonetheless recognizes (20) this on the basis of the transmit message (18). The same holds correspondingly if the transmit message authentication code (16) is transmitted with errors (22) from the security hardware module (12) to the main processor core (11).


The second design (30) relates to the case in which the main processor core (11) receives (31) a receive message (32) having receive data (33) and having a first receive message authentication code (35). Here, the check of the first receive message authentication code (35) includes two basic steps that are standardly combined in a function call verifyMAC: first, a second receive message authentication code (36) is generated (34) on the basis of the receive message (32), containing a first receive message authentication code (35), and the preinstalled key. Second, the calculated second receive message authentication code (36) is compared (42) with the received first receive message authentication code (35). Because this comparison is a process relevant to functional safety, this should be executed on the main processor core (11), as is shown in FIG. 3 and in FIG. 4 together with the remaining relevant malfunctions: if the second receive message authentication code (36) is calculated (34) with errors (45), this is easily recognized (44) by the main processor core (11) or by the security hardware module (12). The main processor core (11) likewise recognizes (46) if the second receive message authentication code (36) is transmitted with errors (47) from the security hardware module (12) to the main processor core (11). A redundant evaluation (39) of the receive message authentication codes by the security hardware module (12) ensures information security in this case as well.


It can be pointed out that this separation (30) of the two substeps of MAC verification may stand in conflict with certain design principles of information security. Because the receiver has only to verify, and not to generate, the first receive message authentication code (35), the fundamental security paradigm of least privilege would require limiting of the functional access at the receiver side to the checking of the first receive message authentication code (35), instead of permitting the generation (34) of the second receive message authentication code (36). The latter functionality (34) could be used by an attacker to use a compromised receiver node to impersonate a transmitter. Therefore, it is recommended to choose the variant realization (30) in accordance with system priorities.


This method (10, 30) can for example be implemented in software or hardware, or in a mixed form of software and hardware, for example in a control device (50), as illustrated by the schematic representation of FIG. 5.

Claims
  • 1. A method for protecting data integrity through an embedded system having a main processor core and a security hardware module, the method comprising: generating, by the main processor core, transmit data;calculating, by the security hardware module, a transmit message authentication code from the transmit data;linking, by the main processor core, the transmit data and the transmit message authentication code to form a transmit message; andtransmitting, by the main processor core, the transmit message to a receiver.
  • 2. The method as recited in claim 1, further comprising one of: recognizing, by the receiver, based on the transmit message, if the transmit message authentication code is calculated with errors; orrecognizing, by the receiver, based on the transmit message, if the transmit message authentication code (16) is transmitted with errors from the security hardware module to the main processor core.
  • 3. The method as recited in claim 1, further comprising: receiving, by the main processor core, a receive message having receive data and a first receive message authentication code;calculating, by the security hardware module, from the receive message, a second receive message authentication code;carrying out, by the security hardware module, based on the first receive message authentication code and the second receive message authentication code, an information security test; andcarrying out, by the main processor core, based on the first receive message authentication code and the second receive message authentication code, a functional safety test.
  • 4. The method as recited in claim 3, wherein, in the information security test, the first receive message authentication code is compared with the second receive message authentication code, if the first receive message authentication code differs from the second receive message authentication code, the information security test fails, and if the first receive message authentication code agrees with the second receive message authentication code, the information security test ends successfully.
  • 5. The method as recited in claim 3, wherein, in the functional safety test, the first receive message authentication code is compared with the second receive message authentication code, if the first receive message authentication code differs from the second receive message authentication code, the functional safety test fails, and if the first receive message authentication code agrees with the second receive message authentication code, the main processor core uses the receive data.
  • 6. The method as recited in claim 3, wherein the main processor core or the security hardware module recognize if the second receive message authentication code is calculated with errors.
  • 7. The method as recited in claim 3, wherein the main processor core recognizes if the second receive message authentication code is transmitted with errors from the security hardware module to the main processor core.
  • 8. A non-transitory machine-readable storage medium on which is stored a computer program for protecting data integrity through an embedded system having a main processor core and a security hardware module, the computer program, when executed by a processor, causing: generating, by the main processor core, transmit data;calculating, by the security hardware module, a transmit message authentication code from the transmit data;linking, by the main processor core, the transmit data and the transmit message authentication code to form a transmit message; andtransmitting, by the main processor core, the transmit message to a receiver.
  • 9. A device for protecting data integrity, the device comprising an embedded system having a main processor core and a security hardware module, wherein the main processor core is designed to transmit data, the security hardware module is designed to calculate a transmit message authentication code from the transmit data, the main processor core is designed to link the transmit data and the transmit message authentication code to form a transmit message, and the main processor core is designed to transmit the transmit message to a receiver.
Priority Claims (1)
Number Date Country Kind
102015221239.4 Oct 2015 DE national