<img src="https://raw.githubusercontent.com/BlockchainCommons/www.blockchaincommons.com/master/images/silicon-salon.jpg" width=1024> <font size="5">#bc-silicon-salon 2022-06-01</font> --- ### This is collaborative session You can follow these slides at: <font size="6">https://hackmd.io/@bc-silicon-salon/rkxbd6rFw9?view#/</font> ### Collaborative Notes at: <font size="6">https://hackmd.io/S7raK1MdSWWciO_Ctm_uhw?edit</font> <!-- Put the link to this slide here so people can follow --> Please join us on a laptop or smartphone! --- ## Who am I? <img src="https://avatars.githubusercontent.com/ChristopherA?s=195"> Christopher Allen (@ChristopherA)<font size=5> - <u>'90s:</u> **Architect**: *RSAREF* & *SSLREF*; **Consultant:** Amix, Xanadu, PGP, RSA, Digicash; **Editor & Co-Author:** *TLS 1.0* - <u>'00s:</u> **CTO:** Certicom; **Adjuct Professor:** BGI Sustainable MBA - <u>'10s</u> **VP:** Blackphone; **Founder:** #RebootingWebOfTrust; **Author:** *10 Principles of Self-Sovereign Identity*; **Principal Architect:** Blockstream - <u>'20s</u> **Co-author:** *W3C Decentralized Identifiers (DIDs)*; **Principal Architect:** Blockchain Commons </font> --- ## <img src="https://i.imgur.com/QyDl5nK.png" width="192" height="192"></br> What is Blockchain Commons? <font size=6> * We bring together blockchain & Web3 stakeholders to collaboratively develop interoperable infrastructure. * We design decentralized solutions where everyone wins. * We are a neutral "not-for-profit" that enables people to control their own digital destiny. </font> --- ## <img src="https://i.imgur.com/QyDl5nK.png" width=192 height="192"><br/>The problem we're solving… --- <img src="https://i.imgur.com/JXU3zwD.png" width=512 > --- ## <img src="https://i.imgur.com/QyDl5nK.png" width=192 height="192"><br/>What do we do? <font size=6> - We work with blockchain & Web3 communities to identify problems & assess needs. - **This is what we're doing today in this salon!** - We use what we learn to collaboratively engineer interoperable specifications. - We evangelize these solutions to the ecosystem. - We support our partners with reference code and test suites so that they can develop their own implementations. </font> --- ## <img src="https://i.imgur.com/QyDl5nK.png" width="192" height="192"><br/>_I've done this before:_ - RSAREF, SSL, TLS - OAuth, FIDO - DID, VC - Smart Custody, Airgap URs & QRs, etc. --- ## Who are you? - Silicon designers - CrossBar, Tropic Square, Supranational - Wallet hardware manufacturers - Foundation Devices, Proxy - Blockchain & Web3 ecosystem members - Bitmark, Unchained Capital - Advocacy organizations - Blockchain Bird, Human Rights Foundation - Cryptographic engineers & cryptographers --- ## Our problem: - Leveraging secrets held on silicon chips as a “root of trust” is desirable <font size="6"> - Unfortunately… - Existing chips don't support modern cryptography. - Standards orgs (IETF, W3C, etc.) are rejecting the needs of the cryptocurrency ecosystem. - Capital costs & lead time for chips are high. - Inefficient IP licensing creates friction for developers. - Current financial incentives fail to create robust, secure infrastructure. - There's the “NASCAR” problem ... </font> --- #### <img src="https://i.imgur.com/v96FZW0.png" width="480"><br/>The NASCAR problem --- ## <img src="https://i.imgur.com/N1tDtE4.jpg" width=480><br/>We've seen this before: <font size="6"> - The “user-centric” promise of OpenID led to too many choices. * **This is the NASCAR problem.** - The big providers then subverted the protocol due to weak interoperability standards that didn't require reciprocity. - The result? Centralized dominance of Google, Facebook & Apple. - Do we want to repeat this pattern? </font> --- ## The Answer <font size="6"> * Follow the process of identification, assessment, collaboration, engineering, evangelization, and support. ***We must:*** - Work together to define <u>use cases & requirements</u> for new silicon chips. - Identify <u>essential features</u> for implementing new cryptography securely in silicon logic. - Create an <u>ecosystem roadmap</u> to support continued investment in secure infrastructure. - Specify <u>interoperable</u> and <u>future-proof</u> functionality. - Eliminate privileged points within the ecosystem. - Limit ability to <u>subvert</u> the shared protocols. </font> --- ## The Process - <u>SCAN</u>: Multiple presentations on these topics, with limited Q&A - _(~ 1 hour then a brief break)_ - <u>FOCUS:</u> Facilitated Q&A on 6 open topics - _(~ 15 minutes each)_ - <u>ACT:</u> Decide on next steps for collaboration - _(~15 minutes)_ --- ## Chatham House Rules Apply <font size="6"> - _"participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s) ... may be revealed."_ - We are recording the presentations for YouTube - We will not be sharing the Q&A, only recording to produce an anonymized summary - Summary will include quotes, but not names - You will have an opportunity to request anything you said be removed from the final summary </font> --- ## Presentations - [ ] CrossBar - [ ] [Proxy](https://hackmd.io/@simonratner/rkUkjkNu9) - [ ] Tropic Square - [ ] [Libre-SOC](https://www.youtube.com/watch?v=us061o4PBZs) - [ ] Supranational --- <!-- after the presentations --> #### Who am I? <font size=5> <img src="https://i.imgur.com/lqjgpmb.png" width=25% /> **Bryan Bishop (@kanzure)** - Software development background, contractor - Bitcoin Core contributor, Blockchain Commons sponsor - previously: - LedgerX (now FTX US Derivatives) - CTO/co-founder/director @ Custodia Bank (prev. Avanti Bank & Trust) - Creator of Webcash.org, a cryptocurrency without a blockchain - Will be taking high-fidelity notes today: https://hackmd.io/@bc-silicon-salon/Byr4vaXOc </font> --- ## Topics 1. Pain points 2. Architectures 3. Boot, firmware & supply chain 4. Cryptographic primitives, protocols & acceleration 5. Threats & countermeasures 6. Edge topics 7. Building a secure infrastructure ecosystem --- ## Pain Points <font size=6> - Semiconductor support is often limited to SEs - Lack of secp256k1 (and negative sentiment) - IP restrictions, patents & NDAs - Devkits, lack of which is made worse by NDAs - NASCAR problem (ecosystem friction) - One-off cryptography & wallet APIs - Future proofing as technology evolves & co-existence with legacy - No one has all the expertise necessary in-house - Lack of available cryptographer talent (and incentives in academia) - Market size, government support (and limits) - Support for continued investment in secure infrastructure </font> --- ## Pain Point Questions _(15 minutes)_ - Any missing pain points? - Disagree about any? --- ## Architectures <font size=6> _"Establishing next-generation **roots of trust**”_ - SE only - Secure key stores - Accelerator only - SE(x2?) & MCU - HSMs & dedicated chips: - Titan (Android), Pluton (Windows), T1/T2 (Apple) - Java SmartCard - Secure-on-chip solutions - Tee, SGX, TrustZone, vSGX - MPC & Collaborative Key Generation </font> --- ## Architecture Questions - Are we missing any important architectures? - Trusted input/output? - Integration (and risks) in larger systems? - What are your perspectives? Where is the market heading? --- ## Boot, Firmware &</br>Supply Chain - Bootloader: programable, multi-stage - Firmware signing & on-chip verification - Chip maker firmware vs OEM firmware vs user code (SE? MCU? both?) - Supply chain authentication - Auditability, verifiability, & public audits of code & secret management --- ## Boot, Firmware &<br/>Supply Chain Questions - Bootloader pain points? - Can OEM/wallet maker replace root of trust with their own? Self-sovereign devices? - Where are multiple security domains a solution? - “certified” and “open”? - How far back does supply chain authentication need to go? - With architectures of multiple chips, what are acceptable limits for updating different chips? - Pro & cons of MicroPython vs. bare metal code (Rust, etc.) --- ## Cryptographic Primitives <font size=5> - New hashes, MACs, Key Derivation - Blake3, SHA3, Poly1305, BIP32 - Symmetric Encryption - AES-512 vs ChaCha (x, 12, 20) - New curves - NIST P-384 (DH, ECDSA, secp384r1) - _Soon to be mandated by US-DHS_ - secp256k1 (DH, ECDSA & Schnorr) - IETF (25519, ed25519, x25519) - ristretto255 & decalf448 - BLS12-381 - ZK-friendly - Plonk & Halo - Quantum-attack resistant - _Emerging NIST requirements_ </font> --- ## Cryptographic Primitives Questions <font size=6> - Are we missing any cryptographic primitives that should be implemented in silicon - Spectrum: how much in RTL vs microcode vs interpreter - What primitives are challenging for your current hardware? - How important are NIST and other government standards? - How important is resistance to quantum computing attacks, to you, today? </font> --- ## Cryptographic Protocols <font size=5> - Signature Systems - Not just signing, but aggregation and revocation - Certs, Verifiable Credentials and DIDs - Browser OpenOAuth, JWTs, DIDComm, Keri - Privacy (including BBS+ signatures) - Multiparty Signature Schemes - Schnorr Aggregated: MuSig2, MuSigDN - Schnorr Threshold: FROST, TOAST - Adaptor Signatures: ECDSA, Schnorr - Various MPC protocols... - Authentication & Key Proofs - PAKE, OPAQUE - Transport - IETF TLS, Signal, Noise, IETF MLS - Cryptocurrencies - In particular Smart Signature scripts </font> --- ## Cryptography Protocol Questions - We can't support all protocols in dedicated silicon, but what parts are critical for you? - Is it security or performance that drives your choices? - How do we do secure hand-off between chips & devices with different capabilities? - supporting secure state machines --- ## Crypto Acceleration - Finite field arithmetic - ECC multiply/add - Zero-knowledge proofs, rangeproofs, bulletproofs, SNARKs, etc. - Multi-exponentiation - Fast Fourier Transforms - Secret Sharing - SSS - Shamir's Secret Sharing - VSS - Verifiable Secret Sharing - PVSS - Publicly Verifiable Secret Sharing --- ## Crypto Acceleration Questions <font size=6> - What other functions need hardware acceleration? - Which are important to you ***NOW***. - What performance requirements do you have now? - Any benchmarks? - When accelerating new cryptography (FROST, MPC, etc.), what are the real requirements for silicon protection of secrets? - Storage of firmware, state, nonces, etc. - What additional use cases could be enabled by hardware acceleration? </font> --- ## Threats & Countermeasures <font size=6> - Supply chain security - Secure input and output - Memory privacy, robustness, longevity - Side-channel resistance - Chip microcode vs RTL in CMOS for crypto algorithms - Physical countermeasures - **Tamper evident:** some indication of tampering whether successful or not - **Tamper resistant:** some resistance to tampering attempts - **Tamper-proof:** impossible case? </font> --- ## Threats & Countermeasure Questions <font size=6> - What are realistic threats? - Best-practices & countermeastures to address these threats? - What are your worries about side-channels? - Any evolving threats that we've not worried about before? - What attacks are the most critical for silicon chips protect against? - Are physical countermeasures important, and why? - What are your requirements for secure input & output? - Is a MCU+SE where the MCU has limited countermeasures just as bad as no SE at all? - Other "systemic" threats? </font> --- ## Edge Topics <font size=6> - Use cases, markets, and market size - E2E, IoT, oracles, sophisticated smart contracts, HSMs, server key management - Openness: IP licensing, NDAs, etc. - What does Open Development mean for chips? - Decentralization / "no platform lock-in" - Sharing security requirements & best practices - Better threat models & adversarial analysis - Multisig changes these significantly! - Compliance, testing services, security review, certification - Outdated certification standards (NIST, etc.)? - Liability issues </font> --- ## Ecosystem <font size=6> - Who are we missing from this discussion? - What are our priorities for further discussion, requirements, new specifications, APIs, reference code? - Any “low-hanging fruit” that need investigation collectively? - Talent: We need more cryptographers, code review, hardware designers - Hiring/job board? - Cryptographers as a shared resource? - Peer security code reviews? - Is there more things that a neutral third-party like Blockchain Commons should be doing? </font> --- ## Next Steps - Collaboration channels for futher discussion - Synchronous: [Private Signal group](https://signal.group/#CjQKINQTJeLo7ee3-i4qX6a94HouFQSXSreoQR6pbtc6JpRrEhBw2-O2uDKu7XjB_RupXaSy) - Asynchronous: [Github discussion area](https://github.com/BlockchainCommons/Airgapped-Wallet-Community/discussions) - Next Silicon Salon? - F2F at [#RebootingWebOfTrust 11](https://www.weboftrust.info/next-event-page.html) in The Hague? - Do you like what we are doing here today? - Become a ongoing [sponsor](http://github.com/sponsors/BlockchainCommons) of Blockchain Commons via GitHub. --- <img src="https://avatars.githubusercontent.com/ChristopherA?s=195"> Christopher Allen (@ChristopherA) <img src="https://i.imgur.com/QyDl5nK.png" width="192" height="192"> www.BlockchainCommons.com
{"metaMigratedAt":"2023-06-17T01:28:20.907Z","metaMigratedFrom":"YAML","title":"Silicon Salon Presentation 2022-06-01","breaks":true,"description":"View the presentation with \"Slide Mode\"","contributors":"[{\"id\":\"408a260c-90cf-4399-836c-fa045d136c3f\",\"add\":31328,\"del\":22188},{\"id\":\"0b0d4b7e-e9c8-49f0-9ef4-13bc8cb215c4\",\"add\":3695,\"del\":1051},{\"id\":\"48930702-4199-4b6e-bcc1-2591943c9acb\",\"add\":3801,\"del\":1657}]"}
    675 views
   Owned this note