title   
  

Design and implementation of robust embedded processor for cryptographic applications

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2010) Design and implementation of robust embedded processor for cryptographic applications. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

[img]
Preview
PDF (This is a RoMEO green publisher -- author can archive post-print (ie final draft post-refereeing)) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
639Kb

Official URL: http://dx.doi.org/10.1145/1854099.1854137

Abstract

Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incorporated into these implementations. These additions further increase the complexity of the cryptographic devices which already need to perform computationally-intensive operations. Therefore, the general-purpose processors are usually supported by coprocessors/hardware accelerators to protect as well as to accelerate cryptographic applications. Using a configurable processor is just another solution. This work designs and implements robust execution units as an extension to a configurable processor, which detect the data faults (adversarial or otherwise) while performing the arithmetic operations. Assuming a capable adversary who can injects faults to the cryptographic computation with high precision, a nonlinear error detection code with high error detection capability is used. The designed units are tightly integrated to the datapath of the configurable processor using its tool chain. For different configurations, we report the increase in the space and time complexities of the configurable processor. Also, we present performance evaluations of the software implementations using the robust execution units. Implementation results show that it is feasible to implement robust arithmetic units with relatively low overhead in an embedded processor.

Item Type:Papers in Conference Proceedings
Uncontrolled Keywords:Security, Cryptographic Algorithms, Montgomery, Robust Arithmetic Operations, Instruction Set Extensions, Computer Architecture
Subjects:Q Science > QA Mathematics > QA075 Electronic computers. Computer science
ID Code:15953
Deposited By:Erkay Savaş
Deposited On:13 Dec 2010 12:09
Last Modified:13 Dec 2010 12:09

Repository Staff Only: item control page