The Secret Processor Will Go to the Ball Benchmark Insider-Proof Encrypted Computing

被引:1
作者
Breuer, Peter T. [1 ]
Bowen, Jonathan P. [2 ]
Palomar, Esther [3 ]
Liu, Zhiming [4 ]
机构
[1] Hecusys LLC, Atlanta, GA 30305 USA
[2] London South Bank Univ, London, England
[3] Birmingham City Univ, Birmingham, W Midlands, England
[4] South West Univ, Chongqing, Peoples R China
来源
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018) | 2018年
关键词
SECURITY;
D O I
10.1109/EuroSPW.2018.00027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
'Encrypted computing' is an approach to preventing insider attacks by the privileged operator against the unprivileged user on a computing system. It requires a processor that works natively on encrypted data in user mode, and the security barrier that protects the user is hardware-based encryption, not access. We report on progress and practical experience with our superscalar RISC class prototype processor for encrypted computing and supporting software infrastructure. This paper aims to alert the secure hardware community that encrypted computing is possibly practical, as well as theoretically plausible. It has been shown formally impossible for operator mode to read (or write to order) the plaintext form of data originating from or being operated on in the user mode of this class of processor, given that the encryption is independently secure. Now we report standard Dhrystone benchmarks for the prototype, showing performance with AES-128 like a 433MHz classic Pentium (1 GHz base clock), thousands of times faster than other approaches.
引用
收藏
页码:145 / 152
页数:8
相关论文
共 38 条
[1]  
Anati I., 2013, P 2 INT WORK HARD AR
[2]  
[Anonymous], 2010, HotSec
[3]  
[Anonymous], 2016, Intel 64 and IA-32 Architectures Software Developer Manuals
[4]  
[Anonymous], 2017, P 51 INT CAMB C SEC, P1, DOI [10.1109/CCST.2017.8167847, DOI 10.1109/CCST.2017.8167847]
[5]  
Biryukov A., 2011, Encyclopedia of Cryptography and Security, P704, DOI [10.1007/978-1-4419-5906-5_588, DOI 10.1007/978-1-4419-5906-5_588]
[6]  
Breuer Peter T., 2013, Engineering Secure Software and Systems. 5th International Symposium, ESSoS 2013. Proceedings, P123, DOI 10.1007/978-3-642-36563-8_9
[7]  
Breuer P. T., 2017, P 14 INT C SEC CRYPT, V4, P247
[8]   A Practical Encrypted Microprocessor [J].
Breuer, Peter T. ;
Bowen, Jonathan P. ;
Palomar, Esther ;
Liu, Zhiming .
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, :239-250
[9]   A Fully Encrypted Microprocessor The Secret Computer is Nearly Here [J].
Breuer, Peter T. ;
Bowen, Jonathan P. .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :1282-1287
[10]  
Buer M., 2006, US Pat. App., Patent No. [11/159,669, 11159669]