对称密钥加密的FPGA软核处理器的安全扩展

Lubos Gaspar, Viktor Fischer, L. Bossuet, R. Fouquet
{"title":"对称密钥加密的FPGA软核处理器的安全扩展","authors":"Lubos Gaspar, Viktor Fischer, L. Bossuet, R. Fouquet","doi":"10.1109/ReCoSoC.2011.5981500","DOIUrl":null,"url":null,"abstract":"When used in cryptographic applications, general-purpose processors are often completed by a cryptographic accelerator — crypto-coprocessor. Secret keys are usually stored in the internal registers of the processor, and are vulnerable to attacks on protocols, software/firmware or cache memory. The paper presents three ways of extending soft general purpose processors for cryptographic applications. The proposed extension is aimed at symmetric key cryptography and it guarantees secure key management. Three security zones are created and physically separated in each of three configurations: processor, cipher and key storage zones. In the three zones, the secret keys are manipulated in a different manner — in clear or enciphered, as common data or keys. The security zones are separated on the protocol, system, architectural and physical levels. The proposed principle is validated on Altera NIOS II, Xilinx MicroBlaze and Actel Cortex M1 soft core processor extensions. The NIOS II processor needs fewer clock cycles per data block encryption, because the security module is included in the processor's data path. The data path of the MicroBlaze is unchanged and thus shorter, but additional clock cycles are necessary for data transfers between the processor and the security module. The Cortex M1 processor is connected via AHB bus and the cryptographic extension is accessed as an ordinary peripheral — a coprocessor. Although the interfacing is different, the three processors with their extensions attain the required high security level.","PeriodicalId":103130,"journal":{"name":"6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure extensions of FPGA soft core processors for symmetric key cryptography\",\"authors\":\"Lubos Gaspar, Viktor Fischer, L. Bossuet, R. Fouquet\",\"doi\":\"10.1109/ReCoSoC.2011.5981500\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When used in cryptographic applications, general-purpose processors are often completed by a cryptographic accelerator — crypto-coprocessor. Secret keys are usually stored in the internal registers of the processor, and are vulnerable to attacks on protocols, software/firmware or cache memory. The paper presents three ways of extending soft general purpose processors for cryptographic applications. The proposed extension is aimed at symmetric key cryptography and it guarantees secure key management. Three security zones are created and physically separated in each of three configurations: processor, cipher and key storage zones. In the three zones, the secret keys are manipulated in a different manner — in clear or enciphered, as common data or keys. The security zones are separated on the protocol, system, architectural and physical levels. The proposed principle is validated on Altera NIOS II, Xilinx MicroBlaze and Actel Cortex M1 soft core processor extensions. The NIOS II processor needs fewer clock cycles per data block encryption, because the security module is included in the processor's data path. The data path of the MicroBlaze is unchanged and thus shorter, but additional clock cycles are necessary for data transfers between the processor and the security module. The Cortex M1 processor is connected via AHB bus and the cryptographic extension is accessed as an ordinary peripheral — a coprocessor. Although the interfacing is different, the three processors with their extensions attain the required high security level.\",\"PeriodicalId\":103130,\"journal\":{\"name\":\"6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)\",\"volume\":\"83 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ReCoSoC.2011.5981500\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ReCoSoC.2011.5981500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在加密应用中,通用处理器通常由一个加密加速器——加密协处理器来完成。密钥通常存储在处理器的内部寄存器中,容易受到协议、软件/固件或缓存存储器的攻击。本文提出了三种扩展加密应用软件通用处理器的方法。该扩展针对对称密钥加密,保证了密钥管理的安全性。在处理器、密码和密钥存储区这三种配置中,创建了三个安全区域并在物理上分开。在这三个区域中,秘密密钥以不同的方式进行操作——作为公共数据或密钥,以透明或加密的方式进行操作。安全区域在协议层、系统层、体系结构层和物理层上是分开的。在Altera NIOS II、Xilinx MicroBlaze和Actel Cortex M1软核处理器扩展上验证了所提出的原理。NIOS II处理器每个数据块加密需要更少的时钟周期,因为安全模块包含在处理器的数据路径中。MicroBlaze的数据路径是不变的,因此更短,但处理器和安全模块之间的数据传输需要额外的时钟周期。Cortex M1处理器通过AHB总线连接,加密扩展作为普通外设-协处理器访问。尽管接口不同,但这三种处理器及其扩展都达到了所需的高安全级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure extensions of FPGA soft core processors for symmetric key cryptography
When used in cryptographic applications, general-purpose processors are often completed by a cryptographic accelerator — crypto-coprocessor. Secret keys are usually stored in the internal registers of the processor, and are vulnerable to attacks on protocols, software/firmware or cache memory. The paper presents three ways of extending soft general purpose processors for cryptographic applications. The proposed extension is aimed at symmetric key cryptography and it guarantees secure key management. Three security zones are created and physically separated in each of three configurations: processor, cipher and key storage zones. In the three zones, the secret keys are manipulated in a different manner — in clear or enciphered, as common data or keys. The security zones are separated on the protocol, system, architectural and physical levels. The proposed principle is validated on Altera NIOS II, Xilinx MicroBlaze and Actel Cortex M1 soft core processor extensions. The NIOS II processor needs fewer clock cycles per data block encryption, because the security module is included in the processor's data path. The data path of the MicroBlaze is unchanged and thus shorter, but additional clock cycles are necessary for data transfers between the processor and the security module. The Cortex M1 processor is connected via AHB bus and the cryptographic extension is accessed as an ordinary peripheral — a coprocessor. Although the interfacing is different, the three processors with their extensions attain the required high security level.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信