[ibis-macro] Minutes for the 23 may 2006 ibis-macro meeting

  • From: "Mike LaBonte \(milabont\)" <milabont@xxxxxxxxx>
  • To: <ibis-macro@xxxxxxxxxxxxx>
  • Date: Wed, 24 May 2006 14:43:06 -0400

Minutes for the 23 may 2006 ibis-macro meeting are attached (really this
time).
 
ARs:
AR: Bob send summit invitation to John Shields
AR: Mike find/make diagram of key escrow system
 
Mike
Meeting date: 23 may 2006
Members (asterisk for those attending):
Arpad Muranyi, Intel Corp.
*Bob Ross, Teraspeed Consulting Group
Todd Westerhoff, Cisco Systems
*Mike LaBonte, Cisco Systems
Paul Fernando, NCSU
Barry Katz, SiSoft
Walter Katz, SiSoft
Ken Willis, Cadence Design Systems
*Ian Dodd, Mentor Graphics
Lance Wang, Cadence Design Systems
*Richard Ward, Texas Instruments
Doug White, Cisco Systems
Sanjeev Gupta, Agilent
Joe Abler, IBM
John Shields, Mentor Graphics

-------------
Review of ARs:

- no ARs

-------------

Continuation of encryption discussion

- Accellera IP protection proposal presented by John Shields last week:
  - John made some documents public and Bob Ross sent link to list.
  - Does encryption cover the AMS extensions of languages?
    - With SPICE we usually leave subckt call line out of the encrypted
      portion.
    - Pure digital models from Mentor had to be protected.
    - An issue with AMS is the common practice of allowing "deep inspection"
      into certain internals of a model.
  - Need to better understand what Accellera is doing
    - If they do a good job maybe we don't need to do anything.
- More details on how the envelope/key chain approach works:
  - All keys come from model vendors
  - The "inner key" is embedded in the envelope file:
    - The model is encrypted with this key.
    - May be the same key for all models sent out, but probably not.
    - Most likely a different key depending on target vendor.
    - Might even use a different key for each user.
  - The "outer key" sent to simulator vendors:
    - The envelope file is encrypted with this key.
    - Model vendors choose the simulator vendors they trust.
    - Each simulator vendor gets a different key.
    - Simulators use this key to decrypt the delivered envelope files.
      - The decrypted envelope contains the key needed to decrypt the
        embedded model.
  - Are model and envelope in separate files?
    - Markup language probably used to embed all in one file.
- How to prevent a leaked/cracked encryption key from compromising all models:
  - The Blu-ray Disc system maintains a list of keys in the disc player.
    - If encryption is compromised, new discs can update the players with
      new encryption keys/system.
- Can this approach be extended to SPICE? Matlab?
  - Vendors may take a wait-and-see approach.
- How to help this proposal succeed:
  - High speed design groups will push for IP protection if IBIS needs it.
  - Would like John Shields to present Accellera IP proposal at DAC summit.
  - Need a way to explain this system quickly
    - A diagram showing model vendor/sim vendor/user and the flow of
      information between them would help.

AR: Bob send summit invitation to John Shields
AR: Mike find/make diagram of key escrow system

-------------
Next meeting: Tuesday 30 may 2006 12:00pm PT

Other related posts: