Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms

被引:1
|
作者
Yumbul, Kazim [1 ]
Savas, Erkay [1 ]
机构
[1] Sabanci Univ, TR-34956 Istanbul, Turkey
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 10期
关键词
cryptography; cryptographic unit; isolated execution; instruction set extension; secure computing; attacks; INSTRUCTION SET EXTENSIONS; PAIRINGS; IMPLEMENTATION; DESIGN;
D O I
10.1093/comjnl/bxu040
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose enhancing a reconfigurable and extensible embedded reduced instruction set computer (RISC) processor core with a protected zone for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory for storing sensitive data during cryptographic computations, and special-purpose and cryptographic registers to execute instructions securely. We outline the principles for secure software implementations of cryptographic algorithms in a processor equipped with the proposed protected zone. We demonstrate the efficiency and effectiveness of our proposed zone by implementing the most-commonly used cryptographic algorithms in the protected zone; namely RSA, elliptic curve cryptography, pairing-based cryptography, Advanced Encryption Standard (AES) block cipher, and secure hash algorithm (SHA)-1 and SHA-256 cryptographic hash functions. In terms of time efficiency, our software implementations of cryptographic algorithms running on the enhanced core compare favorably with equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor. The proposed enhancements for the protected zone are realized on an field programmabel gate array (FPGA) device. The implementation results on the FPGA confirm that its area overhead is relatively moderate in the sense that it can be used in many embedded processors. Finally, the protected zone is useful against cold-boot and micro-architectural side-channel attacks such as cache-based and branch prediction attacks.
引用
收藏
页码:2368 / 2387
页数:20
相关论文
共 50 条
  • [41] Efficient Image Steganography Using Adaptive Cryptographic Algorithms
    Hasan, Mahadi
    Tabassum, Mehnaz
    Hossain, Md Jakir
    INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 558 - 568
  • [42] XGRID: A Scalable Many-Core Embedded Processor
    Gunes, Volkan
    Givargis, Tony
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1143 - 1146
  • [43] FPGA prototyping of a RISC processor core for embedded applications
    Gschwind, M
    Salapura, V
    Maurer, D
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2001, 9 (02) : 241 - 250
  • [44] On the architectural requirements for efficient execution of graph algorithms
    Bader, DA
    Cong, GJ
    Feo, J
    2005 International Conference on Parallel Processsing, Proceedings, 2005, : 547 - 556
  • [45] Processor Arrays Generation for Matrix Algorithms Used in Embedded Platforms
    Perez-Andrade, Roberto
    Torres-Huitzil, Cesar
    Cumplido, Rene
    Campos, Juan M.
    2013 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2013,
  • [46] Exact and approximate algorithms for the extension of embedded processor instruction sets
    Pozzi, Laura
    Atasu, Kubilay
    Ienne, Paolo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2006, 25 (07) : 1209 - 1229
  • [47] Embedded processor characteristics specification through multiobjective evolutionary algorithms
    Ghali, K
    Hammami, O
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1 AND 2, 2003, : 907 - 912
  • [48] A secure and efficient payment protocol based on ElGamal cryptographic algorithms
    Popescu, Constantin
    ELECTRONIC COMMERCE RESEARCH, 2018, 18 (02) : 339 - 358
  • [49] A secure and efficient payment protocol based on ElGamal cryptographic algorithms
    Constantin Popescu
    Electronic Commerce Research, 2018, 18 : 339 - 358
  • [50] Light-weighted cryptographic algorithms for energy efficient applications
    Bhatt, Devershi Pallavi
    Raja, Linesh
    Sharma, Shilpa
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 643 - 650