Design and implementation of robust embedded processor for cryptographic applications

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2010) Design and implementation of robust embedded processor for cryptographic applications. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

[thumbnail of This is a RoMEO green publisher -- author can archive post-print (ie final draft post-refereeing)] PDF (This is a RoMEO green publisher -- author can archive post-print (ie final draft post-refereeing))
yayin06_p178-yumbul.pdf

Download (654kB)

Abstract

Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incorporated into these implementations. These additions further increase the complexity of the cryptographic devices which already need to perform computationally-intensive operations. Therefore, the general-purpose processors are usually supported by coprocessors/hardware accelerators to protect as well as to accelerate cryptographic applications. Using a configurable processor is just another solution. This work designs and implements robust execution units as an extension to a configurable processor, which detect the data faults (adversarial or otherwise) while performing the arithmetic operations. Assuming a capable adversary who can injects faults to the cryptographic computation with high precision, a nonlinear error detection code with high error detection capability is used. The designed units are tightly integrated to the datapath of the configurable processor using its tool chain. For different configurations, we report the increase in the space and time complexities of the configurable processor. Also, we present performance evaluations of the software implementations using the robust execution units. Implementation results show that it is feasible to implement robust arithmetic units with relatively low overhead in an embedded processor.
Item Type: Papers in Conference Proceedings
Uncontrolled Keywords: Security, Cryptographic Algorithms, Montgomery, Robust Arithmetic Operations, Instruction Set Extensions, Computer Architecture
Subjects: Q Science > QA Mathematics > QA075 Electronic computers. Computer science
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Erkay Savaş
Date Deposited: 13 Dec 2010 12:09
Last Modified: 26 Apr 2022 09:00
URI: https://research.sabanciuniv.edu/id/eprint/15953

Actions (login required)

View Item
View Item