首页> 外文OA文献 >Enhancing an embedded processor core for efficient and isolated execution of cryptographic algorithms
【2h】

Enhancing an embedded processor core for efficient and isolated execution of cryptographic algorithms

机译:增强嵌入式处理器内核,以高效且独立地执行密码算法

摘要

We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected zone for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory for storing sensitive data during cryptographic computations, and special-purpose and cryptographic registers to execute instructions securely. We outline the principles for secure software implementations of cryptographic algorithms in a processor equipped with the proposed protected zone. We demonstrate the efficiency and effectiveness of our proposed zone by implementing the most-commonly used cryptographic algorithms in the protected zone; namely RSA, elliptic curve cryptography, pairing-based cryptography, AES block cipher, and SHA-1 and SHA-256 cryptographic hash functions. In termsudof time efficiency, our software implementations of cryptographic algorithms running on the enhanced core compare favorably with equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor. The proposed enhancements for the protected zone are realized on an FPGA device. The implementation results on the FPGA confirm thatudits area overhead is relatively moderate in the sense that it can be used in many embedded processors. Finally, the protected zone is useful against cold-boot and micro-architectural side-channel attacks such as cache-based and branch prediction attacks.
机译:我们建议使用受保护区域来增强可重新配置和可扩展的嵌入式RISC处理器内核,以隔离执行加密算法。保护区是处理器子系统的集合,例如为高速执行整数运算而优化的功能单元,用于在加密计算过程中存储敏感数据的少量本地存储器,以及用于安全执行指令的专用和加密寄存器。我们概述了在配备建议保护区的处理器中加密算法的安全软件实现的原理。通过在保护区中实施最常用的加密算法,我们证明了我们建议的保护区的效率和有效性。即RSA,椭圆曲线密码学,基于配对的密码学,AES块密码以及SHA-1和SHA-256密码学哈希函数。就时间效率而言,我们在增强型内核上运行的加密算法的软件实现与文献中报道的在类似处理器上的等效软件实现相比具有优势。保护区以模块化的方式设计,可以轻松集成到任何RISC处理器中。针对保护区的建议增强功能在FPGA器件上实现。在FPGA上的实现结果证实 udit区域开销在某种意义上说可以在许多嵌入式处理器中使用。最后,保护区对于冷启动和微体系结构侧通道攻击(例如基于缓存的攻击和分支预测攻击)很有用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号