Architecture for protecting critical secrets in microprocessors

被引:84
作者
Lee, RB [1 ]
Kwan, PCS [1 ]
McGregor, JP [1 ]
Dwoskin, J [1 ]
Wang, Z [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton Architecture Lab Multimedia & Secur, Princeton, NJ 08544 USA
来源
32nd International Symposium on Computer Architecture, Proceedings | 2005年
关键词
D O I
10.1109/ISCA.2005.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose "secret-protected (SP) " architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of critical secrets, and key protection and management is a fundamental problem - often assumed but not solved - underlying the use of cryptographic protection of sensitive files, messages, data and programs. SP-processors contain a minimalist set of architectural features that can be built into a general-purpose microprocessor to provide protection of critical secrets and their computations, without expensive or inconvenient auxiliary hardware. SP-architecture also requires a trusted software module, a few modifications to the operating system, a secure I/O path to the user, and a secure installation process. Unique aspects of our architecture include: decoupling of user secrets from the devices, enabling different users to securely access their keys from different networked computing devices; the use of symmetric master keys rather than more costly public-private key pairs; and the avoidance of any permanent or factory-installed device secrets.
引用
收藏
页码:2 / 13
页数:12
相关论文
共 35 条
[1]  
*AMPH CORP, 2002, AES ENCR DECR
[2]  
ANDERSON R, 1997, SPRINGER VERLAG LNCS, V1361, P125
[3]  
[Anonymous], 2004, NIST SPECIAL PUBLICA
[4]  
[Anonymous], 2001, FIPS PUB
[5]   A secure and reliable bootstrap architecture [J].
Arbaugh, WA ;
Farber, DJ ;
Smith, JM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :65-71
[6]  
BEST RM, 1980, P IEEE SPRING COMPCO, P466
[7]  
BLAZE M, 1996, P WORKSH FAST SOFTW, P33
[8]  
DYER J, 1999, P 22 NATL INF SYST S
[9]  
FORD W, 2000, P 5 IEEE INT WORKSH
[10]  
Garay JA, 1997, LECT NOTES COMPUT SC, V1320, P275, DOI 10.1007/BFb0030690