Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms

被引:1
|
作者
Yumbul, Kazim [1 ]
Savas, Erkay [1 ]
机构
[1] Sabanci Univ, TR-34956 Istanbul, Turkey
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 10期
关键词
cryptography; cryptographic unit; isolated execution; instruction set extension; secure computing; attacks; INSTRUCTION SET EXTENSIONS; PAIRINGS; IMPLEMENTATION; DESIGN;
D O I
10.1093/comjnl/bxu040
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose enhancing a reconfigurable and extensible embedded reduced instruction set computer (RISC) processor core with a protected zone for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory for storing sensitive data during cryptographic computations, and special-purpose and cryptographic registers to execute instructions securely. We outline the principles for secure software implementations of cryptographic algorithms in a processor equipped with the proposed protected zone. We demonstrate the efficiency and effectiveness of our proposed zone by implementing the most-commonly used cryptographic algorithms in the protected zone; namely RSA, elliptic curve cryptography, pairing-based cryptography, Advanced Encryption Standard (AES) block cipher, and secure hash algorithm (SHA)-1 and SHA-256 cryptographic hash functions. In terms of time efficiency, our software implementations of cryptographic algorithms running on the enhanced core compare favorably with equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor. The proposed enhancements for the protected zone are realized on an field programmabel gate array (FPGA) device. The implementation results on the FPGA confirm that its area overhead is relatively moderate in the sense that it can be used in many embedded processors. Finally, the protected zone is useful against cold-boot and micro-architectural side-channel attacks such as cache-based and branch prediction attacks.
引用
收藏
页码:2368 / 2387
页数:20
相关论文
共 50 条
  • [31] Space and execution efficient formats for modern processor architectures
    Simecek, I.
    Langr, D.
    2015 17TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 98 - 105
  • [32] Revolver: Processor Architecture for Power Efficient Loop Execution
    Hayenga, Mitchell
    Naresh, Vignyan Reddy Kothinti
    Lipasti, Mikko H.
    2014 20TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA-20), 2014, : 591 - 602
  • [33] The Design of AES-DN Embedded Cryptographic Processor for the RFID/USN Environment
    Lee, Seon-Keun
    Kim, Sun-Yeob
    GRID AND DISTRIBUTED COMPUTING, 2011, 261 : 120 - +
  • [34] Energy-efficient execution of dense linear algebra algorithms on multi-core processors
    Pedro Alonso
    Manuel F. Dolz
    Rafael Mayo
    Enrique S. Quintana-Ortí
    Cluster Computing, 2013, 16 : 497 - 509
  • [35] Energy-efficient execution of dense linear algebra algorithms on multi-core processors
    Alonso, Pedro
    Dolz, Manuel F.
    Mayo, Rafael
    Quintana-Orti, Enrique S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (03): : 497 - 509
  • [36] An embedded-processor architecture for parallel DSP algorithms
    Hobson, RF
    Wong, PS
    Evenson, SA
    ADVANCED SIGNAL PROCESSING ALGORITHMS, ARCHITECTURES, AND IMPLEMENTATIONS VI, 1996, 2846 : 75 - 85
  • [37] Towards an optimal multicore processor design for cryptographic algorithms - A case study on RSA
    Al-Tarawneh, Mutaz
    Alkhresheh, Ashraf
    WSEAS Transactions on Computers, 2014, 13 : 54 - 77
  • [38] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Mehmet Sabır Kiraz
    Osmanbey Uzunkol
    International Journal of Information Security, 2016, 15 : 519 - 537
  • [39] An efficient adaptive polarimetric processor with an embedded CFAR
    Park, HR
    Kwag, YK
    Wang, H
    ETRI JOURNAL, 2003, 25 (03) : 171 - 178
  • [40] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Kiraz, Mehmet Sabir
    Uzunkol, Osmanbey
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 519 - 537