Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/sbellem/qtee

Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.
https://github.com/sbellem/qtee

Last synced: 12 days ago
JSON representation

Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.

Awesome Lists containing this project

README

        

# qtee: Searching for Security through Physics
Repository to explore the physical limits of trusted hardware in the classical and quantum settings.

## Current challenges facing trusted hardware (TEEs):
1. **NO proof of manufacturing** according to a known open source chip design specification
2. **NO proof of non-leakage of secret bits** -- how can we know that the secret bits encoded into the chip were not leaked at any point in time during manufacturing
3. **NO proof of hidden-forever secret bits** -- above and beyond trusting or not trusting the chip manufacturers, and the manufacturing processes, one problem remains: Can we truly hide secret bits of information into physical matter?

See https://github.com/sbellem/qtee/issues/2, for more details. Also, of relevance: https://github.com/sbellem/qtee/issues/1, https://github.com/sbellem/qtee/issues/7, https://github.com/sbellem/qtee/issues/8, [CHIP_ATTACKS.md](CHIP_ATTACKS.md), and [PUFs.md](PUFs.md).

## Intuition
The current leading intuition of the feeble mind of this repo's author is that trusted hardware (which can withstand physical attacks) is impossible in the classical setting, meaning that an adversary who can physically access the chip will be capable to break its security because of physics, regardless of whether the chip is perfectly designed, architected, manufactured, or of whether the manufacturer is honest etc. The claim or intuition is that as per our understanding of the laws of physics, an attacker will be able to read the secret information that has been encoded into the chip and therefore will break the security of the chip. If that claim or intuition holds, then what does that mean for trusted hardware? Is it a pipe dream? Can the quantum setting make a difference? Naively thinking, what if we "throw" the secret information into a black hole? Would that help? Could a chip be designed such that it uses [nano black holes](https://en.wikipedia.org/wiki/Micro_black_hole) to store secret keys? How would key derivation work if the root keys are in a black hole? ETC.

## What's the Problem?
It may be helpful to first define what is meant by trusted hardware and more importantly what is the problem that trusted hardware aims to solve. In order to do so, we'll use the paper [Intel SGX Explained](https://eprint.iacr.org/2016/086) by _Victor Costan and Srinivas Devadas_, as it is an invaluable resource in explaining the various components of Intel SGX, which is arguably the most well-known and popular trusted hardware at the moment of this writing.

Victor Costan and Srinivas Devadas set the stage like so:

> Secure remote computation (Figure 1) is the problem of executing software on a remote computer owned and
maintained by an untrusted party, with some integrity and confidentiality guarantees. In the general setting,
secure remote computation is an unsolved problem. Fully Homomorphic Encryption [61] solves the problem for a
limited family of computations, but has an impractical performance overhead [140].
>
> Intel’s Software Guard Extensions (SGX) is the latest iteration in a long line of trusted computing (Figure 2)
designs, which aim to solve the secure remote computation problem by leveraging trusted hardware in the remote computer. The trusted hardware establishes a secure container, and the remote computation service user uploads the desired computation and data into the secure container. The trusted hardware protects the data’s confidentiality and integrity while the computation is being performed on it.

## Key Work: Black-Hole Radiation Decoding is Quantum Cryptography
[Black-Hole Radiation Decoding is Quantum Cryptography](https://arxiv.org/abs/2211.05491) by _Zvika Brakerski_
-- (Thanks to [@tyurek](https://github.com/tyurek) for sharing)

### Talks
* [Black-Hole Radiation Decoding as a Cryptographic Assumption](https://simons.berkeley.edu/talks/zvika-brakerski-weizmann-institute-science-2023-05-05) by _Zvika Brakerski at the [Minimal Complexity Assumptions for Cryptography](https://simons.berkeley.edu/workshops/minimal-complexity-assumptions-cryptography) workshop at the Simons Institute for the Theory of Computing_
-- (Thanks to [Alex Obadia](https://alexobadia.com/) for sharing.)
* [Quantum Commitments and Black Hole Radiation Decoding](https://simons.berkeley.edu/talks/fermi-ma-uc-berkeley-2023-07-13) by _Fermi Ma at the [Quantum Summer Cluster Workshop](https://simons.berkeley.edu/workshops/quantum-summer-cluster-workshop) at the Simons Institute for the Theory of Computing_

## Resources
* [Intel SGX Explained](https://eprint.iacr.org/2016/086) by _Victor Costan and Srinivas Devadas_
* [The Laws of Physics and Cryptographic Security](https://arxiv.org/abs/quant-ph/0202143) by _Terry Rudolph_
* [Is the security of quantum cryptography guaranteed by the laws of physics?](https://arxiv.org/abs/1803.04520) by _Daniel J. Bernstein_
* [Black-Hole Radiation Decoding is Quantum Cryptography](https://arxiv.org/abs/2211.05491) by _Zvika Brakerski_ (Thanks to [@tyurek](https://github.com/tyurek) for sharing)
* [On black holes, holography, the Quantum Extended Church-Turing Thesis, fully homomorphic encryption, and brain uploading](https://scottaaronson.blog/?p=6599) by _Scott Aaronson_
* [Hayden–Preskill thought experiment](https://en.wikipedia.org/wiki/Hayden%E2%80%93Preskill_thought_experiment)
* [Here’s one way to get out of a black hole!](https://quantumfrontiers.com/2017/04/03/heres-one-way-to-get-out-of-a-black-hole/) by _John Preskill_
* [Using Memory Errors to Attack a Virtual Machine](https://www.cs.princeton.edu/~appel/papers/memerr.pdf) by _Sudhakar Govindavajhala and Andrew W. Appel_ (thanks to [@intoverflow](https://github.com/intoverflow) for sharing)
* [A2: Analog Malicious Hardware](http://static1.1.sqspcdn.com/static/f/543048/26931843/1464016046717/A2_SP_2016.pdf) by _Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, Dennis Sylvester_ (thanks to [@intoverflow](https://github.com/intoverflow) for sharing)
* https://quantumfrontiers.com/author/preskill/

### About Black Holes
* [Search for microscopic black hole signatures at the large hadron collider](https://cms.cern/news/search-microscopic-black-hole-signatures-large-hadron-collider)
* [Micro black hole](https://en.wikipedia.org/wiki/Micro_black_hole)
* [Extra dimensions, gravitons, and tiny black holes](https://home.cern/science/physics/extra-dimensions-gravitons-and-tiny-black-holes)
* [Mini Black Holes Easier To Make Than Thought](https://www.livescience.com/27811-creating-mini-black-holes.html)
* [Information encoded on the surface of a black hole](https://physics.stackexchange.com/questions/17338/information-encoded-on-the-surface-of-a-black-hole)
* [A spiderweb of wormholes could solve a fundamental paradox first proposed by Stephen Hawking](https://www.livescience.com/black-hole-paradox-solution)
* [Black hole information paradox](https://en.wikipedia.org/wiki/Black_hole_information_paradox)
* [Black Hole Encryption](https://www.science.org/doi/10.1126/science.311.5767.1525a)
* [Hayden-Preskill thought experiment](https://youtu.be/lV1ePoCeOdQ) (fun video)
* [Hairy BTZ black hole and its analogue model in graphene](https://www.sciencedirect.com/science/article/abs/pii/S0003491619303197) ([arxiv](https://arxiv.org/abs/1907.03509))
* [Black Hole complexity, unscrambling, and stabilizer thermal machines](https://arxiv.org/abs/2212.11337)
* [Scrambling in the Black Hole Portrait](https://arxiv.org/abs/1307.3458)
* [Black Hole Based Quantum Computing in Labs and in the Sky](https://arxiv.org/abs/1601.01329)
* [Universality of Black Hole Quantum Computing](https://arxiv.org/abs/1605.01407)
* [Production and evaporation of micro black holes as a link between mirror universes](https://arxiv.org/abs/2102.03028)
* [Information in Black Hole Radiation](https://arxiv.org/abs/hep-th/9306083)
* [Holographic measurement and quantum teleportation in the SYK thermofield double](https://arxiv.org/abs/2211.07658)
* [Matrix-Model Simulations Using Quantum Computing, Deep Learning, and Lattice Monte Carlo](https://journals.aps.org/prxquantum/abstract/10.1103/PRXQuantum.3.010324)

### PUFs: Physical Unclonable Functions
See [PUFs.md](./PUFs.md). Also on HackMD at https://hackmd.io/8JDYHl-qQdGGucCV2B7hzA.
* Nature Electronics: https://www.nature.com/articles/s41928-020-0372-5?proof=t
* Wikipedia: https://en.wikipedia.org/wiki/Physical_unclonable_function
* [On the Physical Security of Physically Unclonable Functions](https://d-nb.info/1156184150/34Security%20Analysis%20of%20Physically%20Unclonable%20Functions%20against%20Physical%20Attacks)
* [A Fourier Analysis Based Attack against Physically Unclonable Functions](https://eprint.iacr.org/2017/551.pdf)
* [Feasibility and Infeasibility of Secure Computation with Malicious PUFs](https://eprint.iacr.org/2015/405)

## Contributing
Please do! File issues & pull requests as you wish!. Don't hold back!

Loosely will attempt to follow the [ZeroMQ RFC 42/C4: Collective Code Construction Contract](https://rfc.zeromq.org/spec/42/).

But don't worry about it! Just write your mind in the form of issues and pull requests!

## Origins of this Repository
As I started to learn about Intel SGX, I eventually became very much concerned about chip attacks. Eventually, a small set of slides [Can we Hide Atoms?](https://docs.google.com/presentation/d/1CcVM_0AFCBOpXGiDFtvf2wGz3KBG0EaoxyMXaITEWl0) was put together to convey the concerns at the IC3 Summer Camp 2021, in the context of a Rump Session. The intuition has been that trusted hardware (e.g. Intel SGX), as of now, would require us to be capable to hide atoms, (or subatomic particles, such as electrons), from an attacker who has physical access to the chip.

In other words a secret key, is information, and information is encoded in matter. Hence, the leading question is: "**Can we hide information encoded in matter from an observer, who has access to the matter?**" Intuitivaly, it seems like this is not possible, at least in the classical setting, although PUFs appear to offer a solution. The quantum setting is probably very much different, as the very act of observing may destroy or change what is attempted to be observed.

As for black holes ... At the IC3 Summer Camp 2022, meanwhile having lunch with colleagues, the idea of throwing the secret bits in a black hole felt reassuring as a way to hide the bits. Far from solving the chip attack problem seemingly inherent to TEEs, it did seem to give some hope that perhaps, after all, TEEs were not doomed to be just some pipe dream in which I was wasting precious time. A few months later, [@tyurek](https://github.com/tyurek) shared [Black-Hole Radiation Decoding is Quantum Cryptography](https://arxiv.org/abs/2211.05491) by _Zvika Brakerski_ which, at the very least, in my imagination, gave me some hope that perhaps some kind of future TEEs could leverage high-energy physics objects to implement cryptographic schemes, such that breaking the TEE would require breaking physics.