Let’s say you’re a burglar deciding which house to rob. The first one has a lock on the front door, but the windows are only half shut and could be forced open. The second has a stronger lock on the front door, bars on the windows, video cameras on the roof and a keypad, for disarming an alarm, in the entryway. It’s a pretty easy decision. You say goodbye to the second house, since it’s so heavily protected, and try your luck with the first one.
A similar thing happens with identity theft and government-issued documents. Hackers and other criminals avoid documents protected by robust security mechanisms, and focus instead on poorly protected documents that are more likely to give them what they want.
That’s why NXP developed the IntegralSecurity architecture. It provides a multi-pronged defense that protects data at every point, from the factory to the eID holder’s hand. That way, governments can create the kinds of documents that identity thieves pass by, without a second look.
Effective deterrence
Unlike monolithic approaches, which rely on just a few security mechanisms to protect data, the IntegralSecurity architecture uses more than a hundred interlinked, redundant and highly adaptable security provisions. Each of these attack countermeasures, realized in hardware, can be updated and strengthened selectively, so the architecture keeps pace with the continuously changing threat landscape. Here’s a look at just a few of the security mechanisms used with eGovernment documents:
- Protected IP
The IntegralSecurity architecture uses an advanced 0.09 µm CMOS technology, with several metal layers, to produce a highly protective mesh of active and dynamic multi-threaded shielding. The circuit is nearly impossible to reverse engineer, even if probed by a silicon expert and is structured in such a way that any information stored in the encrypted memories is nearly impossible to decipher.
- Unique electronic “fingerprint”
An exclusive NXP feature, called the Physical Unclonable Function (PUF), uses the unique atomic structure of the semiconductor chip to give the IC the equivalent of a fingerprint. The PUF data can be used over and over, yet remains uniquely paired with the IC. This revolutionizes security for eGov documents, since the chip and its application is protected by a physical property, not memory content. The PUF enables a new kind of key management, and gives the eGov document a “forensic” security feature that is essentially impossible to detect or reproduce.
- Tamper resistance
The highly secure RAM and additional Stealth-NV-Memory use advanced detection techniques that sense when the IC is being tampered with, and shut down sensitive operations when under attack.
- Attack resistance
A wide range of features act as countermeasures against all types of attacks. For example, the SecureFetch feature, which defends against light and laser attacks, offers protection that goes beyond software code to include other kinds of data, too. GlueLogic, for optimum relief of operation system countermeasures and safe as well as fast composite certifications plus approvals, and active shielding technology provide the highest level of attack resilience. The architecture avoids the weaknesses inherent in other approaches by using no hard macros.
- Best-in-class crypto protection
A remarkable combination of crypto algorithms, covering on and off power states, provides what is considered to be the most advanced protection in the industry. The Frame2 crypto coprocessor supports symmetric DES/AES and asymmetric RSA/ECC algorithms, and uses a flexible RSA key length of up to 4,096 bits, yet operates with extraordinary efficiency. In particular, when the power is off, the coprocessor can be protected by the above-mentioned PUF. An optional certified state-of-the-art NXP crypto library is tailored on optimum performance and security and enables fast time to market for any new OS creation.
- Data Guard for multi-applications
For eGov documents that perform more than one function, such as eIDs that also support payment, the IntegralSecurity architecture delivers unrivaled protection. The Memory Management Unit (MMU) acts as a guard for multi-applications through separated application data access and firewall-like protection from cross-over operations.
- Certified assurance
The design and production facilities that support the IntegralSecurity architecture routinely pass the audits for internationally recognized standards for security and quality control, including ISO/IEC 15408. The ICs based on IntegralSecurity have achieved CC EAL6+ certification, which represents the highest practical level of evaluation assurance under the most recent Protection Profiles.
The SmartMX portfolio
The IntegralSecurity architecture reflects NXP’s decades-long leadership in security technologies, and forms the basis of NXP’s SmartMX family of products. We continually upgrade the product line, adding new security features, such as the recently introduced PUF, now available on the SmartMX P60 family. This ongoing commitment to enhanced security yields stronger yet simpler ways to protect confidential data, and forces identity thieves to look elsewhere for opportunities.
Join the conversation
What’s your perspective on security in eGov documents? Do you use an eID? What is your experience with it?
Related links
NXP SmartMX2 P60