Yumbul, Kazım and Savaş, Erkay (2015) Enhancing an embedded processor core for efficient and isolated execution of cryptographic algorithms. Computer Journal, 58 (10). pp. 2368-2387. ISSN 0010-4620 (Print) 1460-2067 (Online)
PDF (This is a RoMEO yellow journal -- author can archive pre-print (ie pre-refereeing))
COMPJ-2013-05-0284.R2.pdf
Download (324kB)
COMPJ-2013-05-0284.R2.pdf
Download (324kB)
Official URL: http://dx.doi.org/10.1093/comjnl/bxu040
Abstract
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected zone for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory for storing sensitive data during cryptographic computations, and special-purpose and cryptographic registers to execute instructions securely. We outline the principles for secure software implementations of cryptographic algorithms in a processor equipped with the proposed protected zone. We demonstrate the efficiency and effectiveness of our proposed zone by implementing the most-commonly used cryptographic algorithms in the protected zone; namely RSA, elliptic curve cryptography, pairing-based cryptography, AES block cipher, and SHA-1 and SHA-256 cryptographic hash functions. In terms
of time efficiency, our software implementations of cryptographic algorithms running on the enhanced core compare favorably with equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor. The proposed enhancements for the protected zone are realized on an FPGA device. The implementation results on the FPGA confirm that
its area overhead is relatively moderate in the sense that it can be used in many embedded processors. Finally, the protected zone is useful against cold-boot and micro-architectural side-channel attacks such as cache-based and branch prediction attacks.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | cryptography, cryptographic unit, isolated execution, instruction set extension, secure computing, attacks |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware Q Science > QA Mathematics > QA075 Electronic computers. Computer science |
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Erkay Savaş |
Date Deposited: | 20 Dec 2014 11:44 |
Last Modified: | 02 Aug 2019 12:10 |
URI: | https://research.sabanciuniv.edu/id/eprint/25176 |