Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit

dc.contributor.authorYumbul, Kazim
dc.contributor.authorSavaş, Erkay
dc.date.accessioned2025-10-29T12:08:41Z
dc.date.issued2009
dc.departmentGebze Teknik Üniversitesi
dc.description2nd International Conference on Security of Information and Networks, SIN'09 -- Famagusta -- 78334
dc.description.abstractCryptographic algorithms handle sensitive information and their safe execution plays an essential role in many security applications. When implemented in software on general-purpose computers, cryptographic algorithms are vulnerable to a variety of attacks such as side-channel and cold-boot attacks since they either share hardware resources with other simultaneously executing processes or store sensitive information in easily accessible places (e.g. main memory). In this paper, we demonstrate that secure and isolated execution of cryptographic algorithms is possible on a cryptographic unit that can easily be integrated to all RISC processors. The cryptographic unit is capable of physically isolating the execution of cryptographic algorithms from all other simultaneously executing processes. By specifically providing an AES implementation running in this isolated execution environment we demonstrate that it is possible to provide physical process isolation for cryptographic algorithms without any significant overhead in execution time. Furthermore, the proposed technique protects the cryptographic applications against cold-boot and cache attacks as well as any other threats originated from other processes since the sensitive material never leave the cryptographic unit. We realized a RISC-based embedded processor with five-stage pipeline featuring the cryptographic unit on an FPGA device. We included the implementation results both for FPGA and ASIC realizations. Copyright 2009 ACM. © 2009 Elsevier B.V., All rights reserved.
dc.description.sponsorshipTaganrog Inst. Technol. South. Fed. Univ.; Russian Foundation for Basic Research; Int. Counc. Electron. Commer. Consult. (EC-Counc.); Kordon Ltd.; World Scientific Publishing (UK) Ltd.
dc.identifier.doi10.1145/1626195.1626233
dc.identifier.endpage151
dc.identifier.isbn9781605584126
dc.identifier.scopus2-s2.0-70350623174
dc.identifier.scopusqualityN/A
dc.identifier.startpage143
dc.identifier.urihttps://doi.org/10.1145/1626195.1626233
dc.identifier.urihttps://hdl.handle.net/20.500.14854/14635
dc.indekslendigikaynakScopus
dc.language.isoen
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_Scopus_20251020
dc.subjectAES
dc.subjectComputer architecture
dc.subjectCryptographic algorithms
dc.subjectInstruction set extensions
dc.subjectPublic key cryptography
dc.subjectSecurity
dc.titleEfficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit
dc.typeConference Object

Dosyalar