Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms

Durahim, Onur Ahmet and Savaş, Erkay and Yumbul, Kazım (2009) Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms. In: 2009 International Conference on ReConFigurable Computing and FPGAs, ReConFig09, Cancun, Mexico (Accepted/In Press)

Warning
There is a more recent version of this item available.
[thumbnail of This is a RoMEO green publisher -- author can archive pre-print (ie pre-refereeing) and publisher's version/PDF ; author cannot archive post-print (ie final draft post-refereeing)] PDF (This is a RoMEO green publisher -- author can archive pre-print (ie pre-refereeing) and publisher's version/PDF ; author cannot archive post-print (ie final draft post-refereeing))
tpm_in_uproc.pdf

Download (115kB)

Abstract

We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processor for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory, and general and special-purpose registers. We outline the principles for secure software implementation of cryptographic algorithms in a processor equipped with the protected zone. We also demonstrate the efficiency and effectiveness of the protected zone by implementing major cryptographic algorithms, namely RSA, elliptic curve cryptography, and AES in the protected zone. In terms of time efficiency, software implementations of these three cryptographic algorithms outperform equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor; its area overhead is considerably moderate in the sense that it can be used in vast majority of embedded processors. The protected zone can also provide the necessary support to implement TPM functionality within the boundary of a processor.
Item Type: Papers in Conference Proceedings
Uncontrolled Keywords: cryptography; cryptographic unit; isolated execution; secure computing; trusted computing;
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Erkay Savaş
Date Deposited: 26 Nov 2009 23:38
Last Modified: 26 Apr 2022 08:53
URI: https://research.sabanciuniv.edu/id/eprint/12986

Available Versions of this Item

Actions (login required)

View Item
View Item