= Proposal for a Possum - Hardware =

 . The following outlines a proposal to advance [[Possum]] as a [[Technology/Laboratory/Hardware/Possum|hardware design]] competition.

 . This proposal assumes that the [[Technology/Laboratory/Software/Possum|Software]] is set as CAcert's current software.  This imposes a standard PC platform requirement on the hardware:  OpenSSL, C, Linux or similar.  Protocol and Interface may be varied at proposer's suggestion.

 . The design space is the hardware and physical security module, including the hardware interface, as [[Technology/Laboratory/Hardware/Possum|"required"]].

 . See
    . [[Possum]] for main information
    . [[Technology/Laboratory/Software/Possum]] for the developed design scope of the Software
    . [[Technology/Laboratory/Hardware/Possum]] for the developed design scope of the Hardware
    . [[Brain/Study/Possum/Hardware]] for the ongoing project concept (this page)

== Timeline ==

 ||'''Month''' || '''Activity''' || '''Comments''' ||
 || 0 || Secure initial funding || need enough to guarantee a venue, accomodation, management ||
 || 0.5 || Announcement || get the basics buzz going ||
 || 1 || Call for submissions, with announcement of date M12 and country. || Submissions of hardware designs need a year or so.  Align date with University calendar? ||
 || 2 || Additional funding for travel grants || Need to bring in some groups ||
 || 3 || Acceptance of early submissions || need to establish some size of event ||
 || 4 || Additional funding for Jury || and prize if possible ||
 || 6 || Jury Selection || need funding to fly in jury ||
 || 9 || Final selection of submissions || need confirmation to team that they are "in" for flights & dates logistics ||
 || 12|| Event. || 1 day, aligned with other event of say 2 days, need 4 nights accomodation times how ever many people ||

== Submission ==

 . Submissions in application (by M9) should include:

  . - General Approach

 . Submissions in the event should include:

  . - General Approach
  . - Threat model, being the list of threats that are analysed
  . - Security Model, being the design to deal with the threats accepted
  . - Implications on the rest of the system
  . - Strengths and Weaknesses ?
  . - Cost model.  Estimate of how much it costs to build.
  . - Constructed example(s).

== Event ==

 . Day 1.  A full day of presentations should be held before the aligned conference.  In this day, each team gets X minutes to present and Y minutes of questioning.  Criticisms from other teams welcomed (obligatory!).

 . Day 2.  Jury debates in private.

 . Day 3.  Jury presents and awards, as scheduled event in conference.

== Jury ==

 . Selected in private negotiations.  Require a leader who can get the team to work together and bring out the results.

 . Will require costs.  Flights & accomodation.