Block-level added redundancy explicit authentication for parallelized encryption and integrity checking of processor-memory transactions

作者: Reouven Elbaz , Lionel Torres , Gilles Sassatelli , Pierre Guillemin , Michel Bardouillet

DOI: 10.1007/978-3-642-17499-5_10

关键词:

摘要: The bus between the System on Chip (SoC) and external memory is one of weakest points computer systems: an adversary can easily probe this in order to read private data (data confidentiality concern) or inject integrity concern). conventional way protect against such attacks ensure implement two dedicated engines: performing encryption another authentication. This approach, while secure, prevents parallelizability underlying computations. In paper, we introduce concept Block-Level Added Redundancy Explicit Authentication (BL-AREA) describe a Parallelized Encryption Integrity Checking Engine (PE-ICE) based concept. BL-AREA PE-ICE have been designed provide effective solution both security services allowing for full parallelization processor write operations optimizing hardware resources. Compared standard which ensures only confidentiality, show that additionally guarantees code less than 4% run-time performance overhead.

参考文章(40)
Wayne P. Burleson, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, Romain Vaslin, High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems international conference on engineering of reconfigurable systems & algorithms. pp. 117- 123 ,(2007)
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Chris J. Mitchell, Cryptanalysis of two variants of PCBC mode when used for message integrity australasian conference on information security and privacy. pp. 560- 571 ,(2005) , 10.1007/11506157_47
Andrew Huang, Keeping Secrets in Hardware: The Microsoft Xbox Case Study cryptographic hardware and embedded systems. pp. 213- 227 ,(2002) , 10.1007/3-540-36400-5_17
Mihir Bellare, Chanathip Namprempre, Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm international conference on the theory and application of cryptology and information security. pp. 531- 545 ,(2000) , 10.1007/3-540-44448-3_41
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Ralph C. Merkle, Protocols for Public Key Cryptosystems ieee symposium on security and privacy. pp. 122- 122 ,(1980) , 10.1109/SP.1980.10006
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas, AEGIS: architecture for tamper-evident and tamper-resistant processing international conference on supercomputing. pp. 357- 368 ,(2003) , 10.1145/2591635.2667184
Sean W Smith, Steve Weingart, Building a high-performance, programmable secure coprocessor Computer Networks. ,vol. 31, pp. 831- 860 ,(1999) , 10.1016/S1389-1286(98)00019-X
G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas, AEGIS: A single-chip secure processor Information Security Technical Report. ,vol. 10, pp. 63- 73 ,(2005) , 10.1016/J.ISTR.2005.05.002