The Secret Processor Will Go to the Ball Benchmark Insider-Proof Encrypted Computing

被引:1
作者
Breuer, Peter T. [1 ]
Bowen, Jonathan P. [2 ]
Palomar, Esther [3 ]
Liu, Zhiming [4 ]
机构
[1] Hecusys LLC, Atlanta, GA 30305 USA
[2] London South Bank Univ, London, England
[3] Birmingham City Univ, Birmingham, W Midlands, England
[4] South West Univ, Chongqing, Peoples R China
来源
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018) | 2018年
关键词
SECURITY;
D O I
10.1109/EuroSPW.2018.00027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
'Encrypted computing' is an approach to preventing insider attacks by the privileged operator against the unprivileged user on a computing system. It requires a processor that works natively on encrypted data in user mode, and the security barrier that protects the user is hardware-based encryption, not access. We report on progress and practical experience with our superscalar RISC class prototype processor for encrypted computing and supporting software infrastructure. This paper aims to alert the secure hardware community that encrypted computing is possibly practical, as well as theoretically plausible. It has been shown formally impossible for operator mode to read (or write to order) the plaintext form of data originating from or being operated on in the user mode of this class of processor, given that the encryption is independently secure. Now we report standard Dhrystone benchmarks for the prototype, showing performance with AES-128 like a 433MHz classic Pentium (1 GHz base clock), thousands of times faster than other approaches.
引用
收藏
页码:145 / 152
页数:8
相关论文
共 38 条
[21]  
Hashimoto M., 2001, US Pat, Patent No. 0018736
[22]  
Hwang K., 2011, COMP SCI
[23]  
Kissell K., 2006, US Patent App, Patent No. [11/257,381, 11257381]
[24]  
Knudsen LR, 1998, LECT NOTES COMPUT SC, V1372, P206
[25]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[26]  
Kömmerling O, 1999, PROCEEDINGS OF THE USENIX WORKSHOP ON SMARTCARD TECHNOLOGY (SMARTCARD '99), P9
[27]  
Maas Martin, 2013, P ACM SIGSAC C COMP, P311, DOI DOI 10.1145/2508859.2516692
[28]  
OSTROVSKY R, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P514, DOI 10.1145/100216.100289
[29]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[30]  
Patterson D.A., 1994, COMPUTER ORG DESIGN