Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

So far we’ve talked in general terms of the appearance of the secure core and its interior circuitry. Now, let us be a bit more specific, starting with the physical enclosure. We’ve already seen that the form factor, as is said in the trade, is a card for phone applications. Actually, the public phone cards are typically the size of standard credit cards, while a SIM card for a cellular phone is smaller. There are even smaller cards now being considered for cellular phones that are getting continuously more miniaturized. The card form factor is very convenient for embedding a secure core in a personal electronic device, as it creates a natural frontier between the untrusted part of the device and its trusted part. The natural question at this point is whether the untrusted part actually somehow taints the trusted part. The answer to that is yes and no. As long as the secure part is using the unsecure part only as a channel to talk to another secure component somewhere on the network, there is little the unsecure part can do to alter the integrity of the secure core. Of course, it can close the channel of communication or flood it with meaningless garbage; therefore it can affect the trust placed in the secure core to function properly. Also, if the secure core relies on the unsecure part for obtaining input information, such as a personal identification number, then the situation is more delicate since the unsecure part can feed bogus data to the secure component. More to the point, the unsecure part can make a copy of the information and perhaps reuse it at a later time. We must then consider that if the input itself cannot be trusted can anything be done to at least have some tamper-evident aspect to the information? As we’ll see, some measures can indeed be taken.

Thus far, our discussion illustrates the fact that it is difficult to limit trust to isolated components of the network, while ignoring other components that may not be themselves trusted. We will come back later to this issue when we explore the sensori-motor environment of the secure core of personal electronic devices. Indeed, in Chapter 9 we will suggest some mutational changes in such devices for just this purpose. For the moment, let us observe that the card form factor is not the only way to physically embed trusted cores. A very common form factor outside of the computer world is that of a key. A number of emergent computer world components, such as the USB (Universal Serial Bus) memory-sticks that readers are probably familiar with, take on very similar characteristics to standard keys. Another form factor is that of an RFID (Radio-Frequency Identification) tag. Yet another is that of an identity document such as a passport in which the trusted core is found inserted in the cover of the document. In all these cases, the form is dictated by the function, but does not necessarily provide additional security properties compared to the card form factor. However, this too can happen. For example, the trusted core embedded in a passport is protected by an electrical shield that prevents reading the passport information contained in the secure chip from a distance. This chip can only be read from close proximity with specialized reading equipment, while the passport is open. In this particular case, we see clearly that trust extends to the physical environment of the secure core.

We have considered the form factor characteristics of the secure core. Now let us review the facilities of the secure core processor itself. The central part of the secure core is, as for any computer, the processor or processors. In some cases there may actually be several processors present. While a general processor might be enough in principle to provide secure operations, for reasons of efficiency, specialization is most often found in secure processors with a sharing of tasks among dedicated modules. The most typical such configuration, almost a signature of secure cores, is a cryptographic co-processor. This is a processor that is specialized in the particular mathematics required by cryptographic operations. Fast processing of special computations requiring long-integer arithmetic can be obtained by dedicated circuitry, coupled with particular security measures necessitated by the very nature of the operations performed. These extra protections are needed because if one wants to attack operations of a secure core the cryptographic processor is an obvious target because it does not just encrypt and decrypt information direct to or

230

7 In His Own Image

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)