Enhanced Security Features for Commodity Integrated Circuits

Award Information
Agency:
Department of Defense
Amount:
$100,000.00
Program:
SBIR
Contract:
W9113M-07-C-0059
Solitcitation Year:
2006
Solicitation Number:
2006.3
Branch:
Missile Defense Agency
Award Year:
2007
Phase:
Phase I
Agency Tracking Number:
B063-050-0670
Solicitation Topic Code:
MDA06-050
Small Business Information
MICROELECTRONICS RESEARCH DEVELOPMENT CO
4775 Centennial Avenue, Suite 130, Colorado Springs, CO, 80919
Hubzone Owned:
N
Woman Owned:
N
Socially and Economically Disadvantaged:
N
Duns:
619085371
Principal Investigator
 Martin Denham
 Principal Investigator
 (541) 385-9464
 marty.denham@micro-rdc.com
Business Contact
 Mary Dyson
Title: Director Business Operations
Phone: (505) 294-1962
Email: mary.dyson@micro-rdc.com
Research Institution
N/A
Abstract
COTS IC manufacturing technologies are capable of deployment to spaced-based vehicles. Their performance levels, degree of innate rad-hardness, and cost-effective yields make them compelling for U.S. strategic launch vehicles. It is of concern that some of the ‘generation-N’ COTS IC fabrication steps are moving outside of U.S. jurisdictional control. It is crucial that secure data and algorithms on these ICs cannot be compromised through reverse engineering and possibly misused by adversaries. Micro-RDC proposes further development of its anti-tamper by design (ATBD) stealthy key storage and stealthy micro-store encryptions, that effectively cannot be reverse engineered, having sufficient entropy and autonomy so as to prevent any key compromises from exploiting other systems or even further levels within the same IC or system. Micro-RDC proposes a phase I effort focused on the following four (4) development objectives: (1) continue to leverage overt technologies such as complex LFSR-based ciphers to scramble code-stores, structured ASICs, and other digital circuitry; (2) apply similar cipher techniques to scramble and obfuscate chip IOs; (3) develop stealthy keys and ciphers, and (4) demonstrate the kinds of stealthy key and cipher technologies that an adversary might deploy in low-cost COTS capabilities, providing the opportunity to develop suitable counter-attacks.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government