Type of Document Dissertation Author Chen, Zhimin Author's Email Address firstname.lastname@example.org URN etd-06232011-231147 Title SCA-Resistant and High-Performance Embedded Cryptography Using Instruction Set Extensions and Multi-Core Processors Degree PhD Department Electrical and Computer Engineering Advisory Committee
Advisor Name Title Schaumont, Patrick Robert Committee Chair da Silva, Claudio R. C. M. Committee Member Hsiao, Michael S. Committee Member Nazhandali, Leyla Committee Member Sakiyamam, Kazuo Committee Member Yao, Danfeng Committee Member Keywords
- embedded systems
- embedded security
- virtual secure circuit
- side-channel attack
- parallel Montgomery multiplication
Date of Defense 2011-06-17 Availability unrestricted Abstract
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represent our electronic identity; they store private information; they monitor health status; they do confidential communications, and so on. All these applications rely on cryptography and, therefore, present us a research objective: how to implement cryptography on embedded systems in a trustworthy and efficient manner.
Implementing embedded cryptography faces two challenges - constrained resources and physical attacks. Due to low cost constraints and power budget constraints, embedded devices are not able to use high-end processors. They cannot run at extremely high frequencies either. Since most embedded devices are portable and deployed in the field, attackers are able to get physical access and to mount attacks as they want. For example, the power dissipation, electromagnetic radiation, and execution time of embedded cryptography enable Side-Channel Attacks (SCAs), which can break cryptographic implementations in a very short time with a quite low cost.
In this dissertation, we propose solutions to efficient implementation of SCA-resistant and high-performance cryptographic software on embedded systems. These solutions make use of two state-of-the-art architectures of embedded processors: instruction set extensions and multi-core architectures. We show that, with proper processor micro-architecture design and suitable software programming, we are able to deliver SCA-resistant software which performs well in security, performance, and cost. In comparison, related solutions have either high hardware cost or poor performance or low attack resistance. Therefore, our solutions are more practical and see a promising future in commercial products. Another contribution of our research is the proper partitioning of the Montgomery multiplication over multi-core processors. Our solution is scalable over multiple cores, achieving almost linear speedup with a high tolerance to inter-core communication delays. We expect our contributions to serve as solid building blocks that support secure and high-performance embedded systems.
Filename Size Approximate Download Time (Hours:Minutes:Seconds)
28.8 Modem 56K Modem ISDN (64 Kb) ISDN (128 Kb) Higher-speed Access Chen_Z_D_2011.pdf 9.53 Mb 00:44:06 00:22:41 00:19:50 00:09:55 00:00:50
If you have questions or technical problems, please Contact DLA.