publication . Doctoral thesis . Article . 2007

Secure computing on reconfigurable systems

Ricardo Chaves;
Open Access English
  • Published: 11 Dec 2007
  • Country: Netherlands
Abstract
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performances. Moreover, it is adaptable to new algorithms, protocols, and threats. In this dissertation, high performance cryptographic units for symmetric encryption and hash funct...
Subjects
free text keywords: secure computing, hardware attestation, reconfigurable systems, fpga
Download fromView all 2 versions
TU Delft Repository
Doctoral thesis . 2007
Provider: NARCIS
44 references, page 1 of 3

3.1 Stand-alone DES performances . . . . . . . . . . . . . . . . . 51 3.2 AES implementation results . . . . . . . . . . . . . . . . . . 59 3.3 AES folded core performance comparisons . . . . . . . . . . 60 3.4 AES unfolded core performance comparisons . . . . . . . . . 61 4.1 SHA-1 data block expansion unit comparison. . . . . . . . . . 76 4.2 SHA-1 DM addition comparison. . . . . . . . . . . . . . . . . 77 4.3 SHA-1 core performance comparisons. . . . . . . . . . . . . . 78 4.4 SHA256 core performance comparison. . . . . . . . . . . . . 79 4.5 SHA512 core performance comparison. . . . . . . . . . . . . 80 4.6 Whirlpool performance comparison . . . . . . . . . . . . . . 86 5.1 Virtex II Pro internal configuration registers. . . . . . . . . . . 93 5.2 Virtex II Pro CMD Register commands. . . . . . . . . . . . . 94

[14] S. Vassiliadis, S. Wong, G. N. Gaydadjiev, K. Bertels, G. Kuzmanov, and E. M. Panainte, “The Molen polymorphic processor,” IEEE Transactions on Computers, pp. 1363- 1375, November 2004. [OpenAIRE]

[15] Xilinx, Virtex-II Pro and Virtex-II Pro X FPGA User Guide, ug012 (v4.1) ed., March 2007.

[16] A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, “Swatt: Software-based attestation for embedded devices,” in IEEE Symposium on Security and Privacy, pp. 272-, IEEE Computer Society, May 2004. [OpenAIRE]

[17] E. Shi, A. Perrig, and L. van Doorn, “Bind: A fine-grained attestation service for secure distributed systems,” in IEEE Symposium on Security and Privacy, May 2005. [OpenAIRE]

[18] Douglas R. Stinson, “Cryptography - Theory and Practice,” CRC Press, 1995.

[19] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 2001.

[20] NIST, “Data encryption standard (DES), FIPS 46-3 ed,” tech. rep., National Institute of Standards and Technology, 1998.

[21] C. E. Shannon, “Communication theory of secrecy systems,” Bell Systen Technicl Journal, vol. 28, pp. 656-715, October 1949.

[22] NIST, “Data encryption standard (DES), FIPS 46-2 ed,” tech. rep., National Institute of Standards and Technology, December 1993.

[23] J. DAEMEN and V. RIJMEN, “The design of rijndael. AES-the advanced encryption standard,” Springer-Verlag, 2002. [OpenAIRE]

[24] J.-C. Bajard and L. Imbert, “A Full RNS Implementation of RSA,” IEEE Trans. Computers, vol. 53, no. 6, pp. 769-774, 2004.

[25] H. Nozaki, M. Motoyama, A. Shimbo, and S. ichi Kawamura, “Implementation of RSA Algorithm Based on RNS Montgomery Multiplication,” in C¸ etin Kaya Koc¸ et al. [105], pp. 364-376.

[26] D. Mesquita, B. Badrignans, L. Torres, G. Sassattell, M. Robert, J.-C. Bajard, and F. G. Moraes, “A Leak Resistant Architecture Against Side Channel Attacks.,” in FPL, August 2006.

[27] M. Neve, E. Peeters, and J.-J. Quisquater, “Parallel FPGA implementation of RSA with Residue Number Systems - Can side-channel threats be avoided?,” IEEE Midwest International Symposium on Circuits and Systems 2003 (Special session on Security and Cryptographic Hardware Implementations), December 2003.

44 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue