Quantum-Resistant IoT Security

Many IoT systems remain in the field for years or even decades, creating major challenges for security. Building automation and industrial systems are prime examples. Conventional IoT security and encryption techniques may be sufficient for now, but advances in technology like quantum computing will soon break popular methods like ECC and RSA.

What’s the best way to protect valuable infrastructure in the long term? Listen to this podcast with Veridify CEO Louis Parks or read the transcript below:

  • Why technologies like firewalls are difficult to deploy in multi-vendor IoT systems
  • Why device authentication is a critical element for building and industrial IoT security
  • How to use bump-in-the-wire security to retrofit legacy infrastructure
  • Why quantum-resistant encryption is needed for long-term IoT security

Apple Podcasts  Spotify  Google Podcasts  

Podcast Source

“We need to be thinking about we can keep a building safe today and certainly for the next five, six, eight years. But how do we keep it safe for the long term and that’s where you will need to term to quantum resistant methods.”

[KW] That was Louis Parks [LP], the Chairman, CEO and Co-Founder of Veridify. And I’m Kenton Williston [KW] , the Editor-in-Chief of Insight.Tech. Every episode on the IoT Dev Chat, I talk to industry experts about the technology and business trends that matter for developers, systems integrators and end users. Today I’m talking to Louis about the security challenges for smart buildings and industrial automation and some cool new ways you can lock down your assets, including the quantum resistant cryptography Louis just mentioned. Louis, I can’t wait to dig in. Can you tell me a little bit about yourself and what Veridify does?

[LP] Veridify is focused on security for very, very low resource devices and really has been since its inception. And what I mean by that, since security is a very big landscape, we’re focused on identification and authentication, which not always working, but we take for granted when we do our banking and do things on large, powerful platforms like PCs or smartphones. But when you have very, very low resource processors, perhaps in an embedded device or in the Internet of Things, authenticating them and knowing they are your device can be difficult. So we develop methods for doing that type of authentication identification. I have three partners who are mathematician cryptographers and specialists in the area who help develop these very efficient protocols. And I’m a co-founder of the company who helps figuring out how we take these things to market and turn them into the products that we market today.

[KW] So this is a really interesting topic and timely topic, I think, because the just general security landscape has been, it’s an ever shifting landscape to be sure.
But I think last year with the pandemic and people moving to remote work, there’s been just a real, I think, significant shift broadly on the sort of threats people are encountering. So I’m wondering what comes to the areas you specifically are looking at things like industrial IoT and building automation and control systems, how you see the landscape shifting in those specific areas.

[LP] So first of all, the change in how we work has really brought attention to the whole idea of security. Privacy, of course, is something that comes out of that.
But the idea now that whether it’s your video call on whatever platform you’re using, the ordering, banking, what have you, suddenly we’re all aware that it’s a very digital world
from retail to socialization. So that’s sort of a heightened awareness that we’re operating against. And what we see now and what has continued is a level of sophistication, because as we’ve
tried to connect more things together to make it efficient so we could work remote, work from home, make the supply chain more efficient, whatever, has given a broader horizon for
the hackers and attackers out there to infiltrate and or go after things. Our focus, again, is on the small devices that run these things.
And specifically, we’ve been very busy the last year in the area of building security. And that’s not getting into a building or the cameras on a building, but rather the
fact that for years and even more than decades, buildings have relied on processors to manage the heating system, the HVAC systems, more recently the lighting systems and the elevators.
So even before the term smart building came into vogue, buildings relied on processors. And in fact, unfortunately, as those have been now connected to the IoT, it’s given another
access route for an attacker to get to the IT systems in the buildings and places where valuable data may be. So really, as we’ve gotten so much more connected and better at operating digitally, so have the attackers.

[KW] Yeah, absolutely. And like I said, this is not exactly an all new trend. It’s something that’s been happening. This example is getting pretty dated by now, but people have been talking about the Stux Net Attack as an example of how the security landscape is not just about the servers, but it’s about all the equipment that’s out there. So I think it’s fair to say there’s a broad sense that, hey, you’ve got to protect your IoT systems. But I think it’s also the case that people don’t really fully appreciate all the time, just what exactly the threat landscape is. So I’m wondering from your point of view, are you seeing some significant risks that people generally are not aware of?

[LP] Oh, absolutely. When you talk about attacks and what have you, the threat landscape goes back before we got the label IoT. I remember well over 10 plus years ago, being in Washington at a meeting where they were discussing technologies to help with border security. And many people listening to this and maybe on the podcast, have a car where you can look at the air pressure in your tires on a dashboard or in a display to know if the air pressure is good or not. And that technology comes to you courtesy of RF, radio frequency, little broadcasters in the wheels, talking to your cars that have been paired and anybody’s had a damaged wheel. Like I have, you know that the dealership will charge you dearly to pair a new wheel to your car. But because it’s RF radio frequency, it’s not only talking to your car, but it’s broadcasting outbound too. So the discussion was, gee, you know, people are driving across the border. Perhaps we could use, you know, that broadcast, that radio frequency broadcast is metadata to identify a vehicle. So that’s arguably a friendly use, if we believe in border security. But the point being is that is what would now be considered an IoT device.
A car itself is probably to many people, an IoT thing now. So these threats, you know, have been around for a long period of time and probably a lot of people have not thought about their wheels on their car, betraying them to somebody for the purposes of location or tracking or other nefarious activities.

[KW] So yeah, that’s a great example. I’ve got a pretty old beater myself, so no RFMI tires, but I have to admit that that was a security risk I was completely unaware of until you mentioned it just now. Now having said all that, you know, our audience probably smarter than me, very well aware of, you know, the many different security risks that are out there and are doing, you know, really good job of trying to secure their IoT systems. And so I’m just wondering from your perspective, to the extent that there ever is any such a thing as a standard approach to anything in the world of IoT where every system is a little bit different, you know, what the standard slash typical approach to security looks like today and where you see it being strong and where you see there being some gaps in the current approaches.

[LP] So there’s a couple of things that you want to do or people are doing and in general, there’s a lot of attention being paid now. Unfortunately again, because the news is not always great and we always get reminders, although not IoT, things like solar winds reminds us that if we’re going to be digital, we are all potentially susceptible to various types of attacks. The challenge in IoT is significant in the sense that we have a really wide range of devices, whether you look at industrial, whether you look at a commercial building or a home, because the devices number one may come from many vendors. We’ve all seen the value of a single vendor solution and the ability to control your world if you come from Apple. And then the value from a marketing perspective, if you allow many players to play, like in the Android world, but at the same time ensuring that all those players are good people. So in the IoT, when you have a mix of technologies, it becomes a challenge and people are understanding that more and more. So there really isn’t one security thing that you should do. There’s probably many. Certainly the first thing is to know if you have an issue and there’s a lot of really good anomaly detection, network monitoring technologies that are being developed so that people who want to know or should know if they have an issue can know. And that doesn’t prevent an attack, doesn’t prevent somebody from stealing data, but arguably a very critical issue to know is, is it happening so that you need to increase or improve whatever it is you’re doing?
Of course, all the other technologies have been around for years and decades, whether it’s malware protection, firewalls, on and on the list goes. You need to employ when you’re talking about networks, but the IoT and a lot of devices and number one operate outside of these very controlled networks, the three floors of your office building. A lot of these devices are out in the open. And the other thing is that a lot of these devices are engineered or designed very eloquently to use absolutely the smallest processor that will deliver all the features.

So one view of some of the audience might be, I have all the tools I need. I’m using them today and they might be on a tablet or a gaming PC or a smartphone. But when you go down to a very, very small 32-bit or 16 or even 8-bit processor that’s been optimized to provide a single function in a building or embedded platform network, you don’t have the luxury of the computational capability to put that authentication technology on it, to put that digital certificate in all of the signing and verification capabilities on it that you take for granted, the TLS or SSL solutions you use when you’re on a network. So there’s a lot of attention being paid to that. There’s a lot of innovative technologies from how do you take public key or asymmetric technologies as we do, both legacy, things like ECC or ECDSA, which some of your viewers will know are 30-35 year-old technologies that still lead the way for legacy to upcoming quantum-resistant methods. How do you shrink them and make them work as well as other technologies like PUFs, physically and unclonable functions, which are fingerprint technologies that enable you to provide unique identification on a per-device basis or a seed of identification, a root of trust. So there’s really a lot of areas that are being brought together, again, because you have a really, really broad mix of devices, and a lot of them need to be out there by themselves, which again is why we focus on device to device as an area, but you would not look to us as a single solution. It would be us in combination, arguably with some of these other technologies, to make yourself secure.

[KW] So let’s talk about your solution a little bit, because like you said, I think when everything’s said and done, one of the biggest challenges you really pointed to you is whether you’re talking about an industrial setting or a building automation setting, you’ve got to landscape with a lot of existing legacy devices that aren’t going to go anywhere anytime soon. You’ve got to landscape with a lot of things that were designed for minimal cost, minimal power. So what are you bringing to the table to help protect this very diverse fragmented landscape that’s not really set up, like you said, for kind of the kind of things you would think about in like a data center or your own home PC kind of setting?

[LP] We’ve been immersed for about a year now with our platform DOME. We developed a few years ago a platform for device management, not unlike many IoT product or device management platforms that are out there. The difference again with ours was we were using or we are using the ability to shrink protocols, asymmetric or public key protocols that allow authentication capability down to fit on the actual device. So a device in the IoT or device out there can actually manage its credential, manage its authentication without the need to connect to a cloud or a server to do that. Of course, connecting to a cloud and server is a very valid way with larger devices that come embedded with URLs to authenticate them. But again, if you have a very small device, it’s only going to operate in a limited network that could provide an exposed platform, that was something that we were focused on. So we developed DOME, a device ownership and management solution where we manage a credential in the cloud in a blockchain for the device. But the device actually challenges and ensures it’s talking to something authentic. We took that and translated it to the building automation world where a building again, as I mentioned earlier in the podcast, for years has run on processors managing elements of a building’s operation today. And of course, it’s getting even more sophisticated. There’s some really brilliant use of technology to make building smart, more comfortable, more adapted to our use, and all of that involves introducing more processors on the operational technology side and to manage them, you connect them to the IT side. And of course, in the IT side is where we find the networks and then the databases and the back offices and of the people in the building. And that’s where the danger emerges. So that has been an interesting challenge and great use.

And there’s one additional element which you alluded to or may not realize you alluded to, and that is 99% of the market that we’re talking about protecting exists. It’s already there, the buildings have been built, they’re running. So if you’re designing a brand new smart building today and if you were just fresh on the plane back, well, you wouldn’t be fresh off your Zoom or digital call from CES with ideas for all the new technology you’re going to put in it, likely there will be some good security tools. So if your building is only two, three, five years old, you probably still want to use that very expensive air handler, cooling system, what have you, you have installed, but it probably is not got the protections you need. So retrofitting security to a pre-existing infrastructure is also a challenge and something that we’ve addressed with something we call “bump in the wire” technology that we’d looked at for a period of time and in fact, develop some solutions with our partner Intel (Altera) to deliver to industrial IOT and have now adapted it for the building automation protocols like BACnet and later Modbus and KNX to retrofit security to a pre-existing infrastructure, in this case, a building, which is another challenge in making things secure in current days.

[KW] So I want to dig into that a little bit more and here’s just a little shameless plug. We’ve got an article that corresponds to this same conversation over on insight.tech. So I encourage our listeners to go check it out. You can get more details on this bump in the wire solution, how it works and why you might be interested in it. But just to look a little bit closer at that here and now, can you tell me a little bit more about what this architecture looks like? And you mentioned that it’s got some Intel technology, what kind of technology is incorporated there?

[LP] Sure. So bump in the wire is not a unique solution to us. Many industries and areas have it or contemplated it. What we’ve done here, a couple of things that are unique. Number one, we’ve based our initial solution on an Intel (Altera) FPGA, a small, very powerful, low-cost FPGA. So not only does it ensure that we can address the security issues today, but an investment in this relatively low-cost device will give us the adaptability going forward because the horizon for the attacks, the nature of the attacks are continuously evolving. And typically, as you’ll see in many, many articles, when they talk about buying something that’s connected or the IoT, they always say, make sure you have a way to update to the latest patches and fixes and what have you. So not only do we have a very powerful platform to provide the technology, but we have one that allow adaptability.

For the building space, what was critical is that we had a relatively simple plug-and-play solution. So it’s a very simple plug-in, plug-out between the controllers and the edge devices that are already installed. Typically running on some sort of IP platform or network. In the building automation space our initial solutions are designed for the BACnet world, which again is a building automation standard for how devices and buildings communicate. So our device is running, it runs the initial ones, NIST approved, legacy, what I refer to as legacy protocols and methods for certification purposes, but other versions of it will run quantum resistant crypto, and we should talk about that for a minute, which is critical for long-term protection. And of course, finally, this is BACnet, which is a building standard, it runs over BACnet IP. We’ve developed other technologies that coordinate with it to ensure that you can also monitor the discussions that are going on. So we’re creating, the summary is we’re creating a secure tunnel from the controller to this bump in the wire device with encrypted data flowing over a BACnet compliant communication. So we don’t replace anything that a building currently has or anything in the standard. And then it protects the device it’s plugged into behind it. So that’s a very simple description of this device, and it’s designed to be flexible in the protocols it manages and what have you, and a lot of that power and flexibility, again, comes from the ability of having this FPGA platform that will allow us to adapt it and some unique functionality capabilities as we move through the building space.

[KW] So you’re talking about this bump in the wire solution, protecting the device that’s behind it. So are we talking about something where you would need to deploy a 1:1 everywhere you’ve got a device? And one of these bumps in the wire, is it per floor, per building, what’s the architecture look like?

[LP] the architecture needs to address a couple of different scenarios. We would suggest the ultimate protection, of course, would be 1:1 and ensure that every device has this secure encrypted element, authenticating all the inbound traffic and encrypting and delivering back all the outbound data back to the controller in the building. That is always possible or feasible and sometimes it’s just probably not the right architecture. So although we do have these relatively low-cost powerful FPGA bump in the wires, we also have a similar technology in a router form. And again, the secure connectivity, which we call S-Link, so we can run it to a router which then could have several devices, so it could be a 1:1 or a 1:many configuration, as is exactly what you find in the building spaces today.

[KW] That makes sense. So I do want for sure to ask you about the quantum cryptography. So this is certainly if you’re up to speed on the latest and greatest security, a hot topic, but in some ways it kind of feels like, gee, if you’re just talking about a building automation system, isn’t this really kind of overkill? So what’s the rationale behind this and why you’ve taken this really hardcore approach?

[LP] It’s not overkill. As a matter of fact, in addition to providing DOM with NIST-approved methodologies, we ourselves and my partners, their background is in the mathematics of asymmetric and public key methods. We’ve developed and published methods, which are quantum resistant, as well as we are working with several methods that NIST now has under review for the purpose of standardization. But focusing just on the question about quantum resistance, again, many of your listeners will be aware, but quantum computers since the late 70s, early 80s were sort of a white paper physics idea that was out there. And about three, four years ago, actually maybe five now as I think about it, IBM and MIT simultaneously managed to create working prototypes. These are not full functioning or were not at the time, full functioning, but proving the science, the technology behind a quantum computer.

Again, these computers are not in the future going to replace our current computing. It’s a different type of computing. You’re probably not going to have a smartphone running on quantum, but they do manage and process data differently than our current conventional computers. And again, there’s a lot of articles, it’s years later. Many of your readers would be familiar with it, but the reason we’re talking about it, and they have evolved and they’re getting better and they’re getting more stable and they’re getting larger, which is a key element so they become more practical to use, likely in a data center type fashion. So they will be great for solving DNA sequencing issues, discovery of new drugs, etc. And unfortunately, there are at least two algorithms that have been developed to run on quantum computers that have been mathematically proven that will attack a weaken and in one case break the legacy methods, which I’ve referred to a few times, elliptic curve, RSA, Diffie-Hellman, when you have a large enough quantum computer. So the part I can’t answer, and it’s hard for anybody. When will that be? It’s not next year or the year after. Could it be five years out or seven years out? Don’t know. People commercially are working on it as our nation states. So it will happen, but we don’t know the timeframe, which brings us back to the discussion today on a building where you put up a building, not unusual to stand for decades, if not 100 years plus. Arguably the systems get replaced, but they get replaced every 15, 20 years. So a system going in today will likely be around when there’s a large enough quantum computer, and that quantum computer will break the ECC or the public key methods. You cannot increase the security of ECC or RSA to avoid it, they will actually be broken by Shor’s algorithm in particular, and weakened by Grover’s algorithm. So we need to be thinking about, we can keep a building safe today and certainly for the next five, six, eight years. But how do we keep it safe for the long term, and that’s where you will need to term to quantum resistant methods?

[KW] Makes sense. And then the follow up question there is why use FPGAs for this role, or is there something particularly advantageous that they offer?

[LP] I guess the fair answer is yes and no. So there are equal processing capable technologies and microcontrollers and ASICs, and one could even argue in some cases even more optimizable technologies than an FPGA. But the critical element for what we’re doing today, and I think for a lot of the building space which we have found to be years behind where the general processing community is, and certainly years behind a lot of the new IoT is we’re providing the tools that we believe and think are critical today, and that landscape is shifting. And I think the key characteristic of the platform that we’re operating with is that it’s field programmable. So we’re delivering solutions that are going through third party testing and all the verifications you want to make sure that they’re secure, but will also give us the capabilities to adapt these devices, not only to different building and industrial IoT operations, but also to adapt to the market and the threats and the nature of what we’re looking to address as we’ve been discussing.

So, although in some cases certainly people are probably familiar with FPGAs, they can cost thousands of dollars. The ones we’re working with and in particular with our partner Intel (Altera) still powerful but are a fraction of that cost. There is not a penalty from that side, but there is a significant dividend from the flexibility and our ability to address the market. And in some cases even specific projects we’re working on where we’ve had discussions with building owners, sophisticated building owners who have very extensive networks operating already within their buildings, understand all the operational technologies and have several requests that frankly we hadn’t contemplated in the basic platform that because we’re working in the FPGA world, we can answer, we can deliver. So we think it’s an ideal solution that the cost benefit, there is significant benefit from this FPGA approach.

[KW] I’m glad you mentioned the cost aspect because I think historically there have been sort of two big factors that have caused people to shy away from FPGA solutions. The one has certainly been historically the cost, although like you said, today there are a lot of very moderate cost solutions that are available. The other though has just been the programming model. The way you configure an FPGA, it’s very different from how you would program a microcontroller, for example. So if I were considering how I wanted to secure my building or my industrial systems, the thought of adding an FPGA in there, I could see making you a little nervous, like is this going to be something that I’m going to actually be able to manage or is it going to require me to learn a whole new skill set. So what do you say to that?

[LP] So first of all, to a lot of the industry, this process will be obfuscated because we’re working with other partners and this is their area of specialty is developing products and
solutions based on FPGA technology. So again, where the functionality of the device does need to be provisioned, whether it’s a microcontroller and ASIC and the other partners and other areas where we are doing similar solutions in a microcontroller setting, the FPGA when it’s being provisioned, both with the functionality of the platform will also be provisioned with the security technology. So again, it may not have the overall efficiency on mass for deployment, but the vendors who are working with it have the basic tools for doing the volumes that we’re talking about here. So again, I think it’ll be proportional. If this was a high volume consumer, low, low, low, low cost, yes, this would create probably a larger component of the cost of the device. So we’re not in pennies, we’re tens of dollars to low hundreds of dollars in some of these cases. So the provisioning costs, I think, are proportional to the device and certainly, again, the overall payback for this type of platform. I think certainly in the early stages of this industry is easily there. This has not been an issue so far in the projects that we’ve been looking at or working with.

[KW] So I think we’ve covered a ton of ground here. So I’m going to ask you a very challenging question, which is if you could wrap this all up and leave our audience with one key takeaway, what would that be? It will be the one message you would want to convey.

[LP] I think the message I’d want to convey is that we all need to have a realization that behind the things we’re using today, there are processors. And just because it doesn’t have a screen and a keyboard or it’s something that you’re not entering your credit card information into, or your banking, you still need to be thinking about security and protection because of the interconnectivity. And again, there are many, many examples way beyond the couple of simple ones I gave and much more eloquent ones. But I would suggest that everybody needs to stay aware that whether it’s you’re working from home or the fact that you can find a car spot easier and a car parking lot because of some new technology, it’s because things are connected and they’re communicating. And when they’re doing that, it’s a convenience, but it’s also a threat platform and should recognize that just because again, it doesn’t have your credit card in it, doesn’t mean that it can’t possess a threat equal. And we should all be aware and hopefully be seeking these solutions to try and stay even, maybe even get ahead of what’s happening in the world of attacks and hacks.

 

Learn about DOME to make IoT devices quantum-resistant.