Secure Key Management on General-purpose Processors - Université Jean-Monnet-Saint-Étienne Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Secure Key Management on General-purpose Processors

Lubos Gaspar
  • Fonction : Auteur
  • PersonId : 881692
Viktor Fischer
Florent Bernard
  • Fonction : Auteur
  • PersonId : 857064

Résumé

When used in cryptographic applications, general-purpose proces- sors are often extended by a cryptographic accelerator - a crypto- coprocessor. Secret keys are usually stored in the internal registers of the processor, and the cryptographic system is therefore vulnerable to attacks on protocols, or software attacks. We present three ways of extending soft core general purpose proces- sors for cryptographic applications. The proposed extension is aimed at symmetric key cryptography and it guarantees secure key manage- ment. We propose to create three physically isolated security zones: processor, cipher and key storage zone. In the three zones, the secret keys are manipulated in a di erent manner - in clear or enciphered, as common data or keys. The security zones are separated on the protocol, system, architectural and physical levels. The proposed principle is validated on Altera NIOS II, Xilinx MicroB- laze and Actel Cortex M1 soft core processor extensions. We show that the NIOS II processor needs fewer clock cycles per data block encryption, because the security module is included in the processor's data path. The MicroBlaze processor communicates with the copro- cessor via standard data registers using dedicated instructions and the high-performance Fast Simplex Link. The data path of the MicroB- laze is unchanged, however additional clock cycles are necessary for data transfers between the processor data registers and the security module. The Cortex M1 processor is connected via the AHB bus and the cryptographic extension is accessed as an ordinary peripheral - a coprocessor. Although the interfacing and the speed is di erent, the three processors with their extensions attain the required high security level by the physical isolation.
Fichier non déposé

Dates et versions

ujm-00664301 , version 1 (30-01-2012)

Identifiants

  • HAL Id : ujm-00664301 , version 1

Citer

Lubos Gaspar, Viktor Fischer, Florent Bernard. Secure Key Management on General-purpose Processors. International Workshops on Cryptographic Architectures Embedded in Reconfigurable Devices - Cryptarchi 2011, Jun 2011, bochum, Germany. ⟨ujm-00664301⟩
36 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More