title   
  

Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms

Durahim, Onur Ahmet and Savaş, Erkay and Yumbul, Kazım (2009) Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms. In: 2009 International Conference on ReConFigurable Computing and FPGAs, ReConFig09, Cancun, Mexico (Accepted/In Press)

WarningThere is a more recent version of this item available.

[img]
Preview
PDF (This is a RoMEO green publisher -- author can archive pre-print (ie pre-refereeing) and publisher's version/PDF ; author cannot archive post-print (ie final draft post-refereeing)) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
112Kb

Abstract

We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processor for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory, and general and special-purpose registers. We outline the principles for secure software implementation of cryptographic algorithms in a processor equipped with the protected zone. We also demonstrate the efficiency and effectiveness of the protected zone by implementing major cryptographic algorithms, namely RSA, elliptic curve cryptography, and AES in the protected zone. In terms of time efficiency, software implementations of these three cryptographic algorithms outperform equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor; its area overhead is considerably moderate in the sense that it can be used in vast majority of embedded processors. The protected zone can also provide the necessary support to implement TPM functionality within the boundary of a processor.

Item Type:Papers in Conference Proceedings
Uncontrolled Keywords:cryptography; cryptographic unit; isolated execution; secure computing; trusted computing;
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
ID Code:12986
Deposited By:Erkay Savaş
Deposited On:26 Nov 2009 23:38
Last Modified:07 Jan 2011 14:58

Available Versions of this Item

Repository Staff Only: item control page