Lightweight instruction-level encryption for embedded processors using stream ciphers

被引:8
|
作者
Hiscock, Thomas [1 ]
Savry, Olivier [1 ]
Goubin, Louis [2 ]
机构
[1] Univ Grenoble Alpes, CEA, LETI, DSYS,LSOSP,CESTI, F-38000 Grenoble, France
[2] Univ Paris Saclay, CNRS, UVSQ, Lab Math Versailles, F-78035 Versailles, France
关键词
Software encryption; Processor design; Security; FPGA; LLVM; INFORMATION LEAKAGE; ARCHITECTURE;
D O I
10.1016/j.micpro.2018.10.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last 30 years, a number of secure processor architectures have been proposed to protect software integrity and confidentiality during its distribution and execution. In such architectures, encryption (together with integrity checking) is used extensively, on any data leaving a defined secure boundary. In this paper, we show how encryption can be achieved at the instruction level using a stream cipher. Thus encryption is more lightweight and efficient, and is maintained deeper in the memory hierarchy than the natural off-chip boundaries considered in most research works. It requires the control flow graph to be used and modified as part of the off-line encryption process, but thanks to the LLVM framework, it can be integrated easily in a compiler pipeline, and be completely transparent to the programmer. We also describe hardware modifications needed to support this encryption method, the latter were added to a 32-bit MIPS soft core. The synthesis performed on a Altera Cyclone V FPGA shows that encryption requires 26% of extra logic, while slowing-down execution time by an average of 48% in the best setting. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 5 条
  • [1] Lightweight Software Encryption for Embedded Processors
    Hiscock, Thomas
    Savry, Olivier
    Goubin, Louis
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 213 - 220
  • [2] Instruction-Level NBTI Stress Estimation and Its Application in Runtime Aging Prediction for Embedded Processors
    Moghaddasi, Iraj
    Fouman, Arash
    Salehi, Mostafa E.
    Kargahi, Mehdi
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (08) : 1427 - 1437
  • [3] StrongBox: Conidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption
    Dickens, Bernard, III
    Gunawi, Haryadi S.
    Feldman, Ariel J.
    Hofmann, Henry
    ACM SIGPLAN NOTICES, 2018, 53 (02) : 708 - 721
  • [4] Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
    Sarkar, Palash
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (03): : 189 - 231
  • [5] Instruction-level Real-time Secure Processor Using an Error Correction Code
    Yoon, Seok Min
    Lee, Seung Wook
    Park, Jong Kang
    Kim, Jong Tae
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2015, 15 (03) : 13 - 16