Blockchain based secret key management for trusted platform module standard in reconfigurable platform

被引:0
|
作者
Paul, Rourab [1 ,2 ]
Ghosh, Nimisha [3 ]
Panigrahi, Amrutanshu [2 ]
Chakrabarti, Amlan [4 ]
Mohapatra, Prasant [5 ]
机构
[1] Siksha O Anusandhan, Comp Sci & Engn, Bhubaneswar, India
[2] Univ Pisa, Dept Comp Sci, Pisa, Italy
[3] Siksha O Anusandhan, Comp Sci & Informat Technol, Bhubaneswar, India
[4] Univ Calcutta, Informat Technol, Kolkata, W Bengal, India
[5] Univ Calif Davis, Comp Sci & Engn, Davis, CA USA
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2024年 / 36卷 / 22期
关键词
blockchain; FPGA; key memory; secret key life cycle; TPM; PROCESSOR;
D O I
10.1002/cpe.8225
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The growing sophistication of cyber attacks, vulnerabilities in high computing systems and increasing dependency on cryptography to protect our digital data, make it more important to keep secret keys safe and secure. A few major issues of secret keys, like incorrect use of keys, inappropriate storage of keys, inadequate protection of keys, insecure movement of keys, lack of audit logging, insider threats and nondestruction of keys can compromise the whole security system severely. In this work, we propose a field programmable gate array (FPGA)-based trusted platform module (TPM) framework for operating system companies and OS users, utilizing blockchain to address NIST-recommended secret key management issues. The security processor used in OS user machines is partitioned into three areas such that processor area, confidential area, and crypto area. The isolated secret key memory in confidential area, along with a private blockchain (BC) can log the life cycle of secret keys of TPM standard. We have also implemented a special custom bus interconnect, which receives custom crypto instructions from Processing Element (PE). During the execution of crypto instructions, the architecture ensures that secret keys are present in confidential area and crypto area but never in the processor area. The movements of secret keys between confidential area, and crypto area are recorded cryptographically after the proper authentication process controlled by the proposed hardware-based private BC framework. To the best of our knowledge, this work is the first attempt to implement a blockchain-based framework between OS company and OS users to address NIST recommended secret key management issues of TPM standard hardware environment. The additional cost of resource usage and timing complexity we spent to implement the proposed idea is nominal. The proposed architecture is implemented with Xilinx Vivado$$ Vivado $$ EDA tool using Artix7$$ Artix\kern0.3em 7 $$ FPGA board.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] On trusted computer platform key management
    Xu Yi
    Fan Huimin
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 579 - 583
  • [2] A management approach to key-used times based on trusted platform module in cloud storage
    Ren, Z. (zhengwei_ren@163.com), 1628, Science Press (50):
  • [3] Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking
    Das, Sanjeev
    Zhang, Wei
    Liu, Yang
    2014 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2014, : 167 - 172
  • [4] Firmware of trusted channel based on the trusted platform control module
    Mao Junjie
    Zhang Chongbin
    Zhang Baofeng
    Guo Ying
    Wu Yushu
    Xie Shihua
    Zhang Xiaofei
    Zhao Shuang
    2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 189 - 192
  • [5] Trusted Platform Module Evolution
    Osborn, Justin D.
    Challener, David C.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 536 - 543
  • [6] Trusted platform Module evolution
    Osborn, Justin D.
    Challener, David C.
    Johns Hopkins APL Technical Digest (Applied Physics Laboratory), 2013, 32 (02): : 536 - 543
  • [7] A blockchain-based platform for decentralized trusted computing
    Liang, Yihuai
    Li, Yan
    Shin, Byeong-Seok
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1499 - 1513
  • [8] Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle
    Huang, Mingyuan
    Cao, Sheng
    Li, Xiong
    Huang, Ke
    Zhang, Xiaosong
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1245 - 1250
  • [9] TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT
    Chiu, Wei-Yang
    Meng, Weizhi
    Li, Wenjuan
    2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 336 - 342
  • [10] FPGA-based trusted platform module attack
    Jiang, W. (j8w8@sohu.com), 1600, Beijing University of Technology (39):