A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors

In this paper we revisit SAM, a security architecture for microprocessors that provides memory encryption and memory verification using hash values, including a summary of its main features and an overview of other related architectures. We analyze the security of SAM architecture as originally proposed, pointing out some weaknesses in security and performance. To overcome them, we supply another hashing and protection schemes which strengthen the security and improve the performance of the first proposal. Finally, we present some experimental results comparing the old and new schemes.

[1]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .

[2]  Dan Boneh,et al.  Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .

[3]  Edwin Naroska,et al.  A combined hardware and software architecture for secure computing , 2005, CF '05.

[4]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[5]  G. Edward Suh,et al.  Aegis: A Single-Chip Secure Processor , 2007, IEEE Des. Test Comput..

[6]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[7]  Morris J. Dworkin,et al.  SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[8]  Klaus Waldschmidt,et al.  Architecture of Computing Systems - ARCS 2006 , 2006, Lecture Notes in Computer Science.

[9]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[10]  Edwin Naroska,et al.  A Cache Design for a Security Architecture for Microprocessors (SAM) , 2006, ARCS.

[11]  Bennet S. Yee,et al.  Using Secure Coprocessors , 1994 .

[12]  Leendert van Doorn,et al.  The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer , 2004, IBM J. Res. Dev..

[13]  Bart Preneel,et al.  Cryptographic hash functions , 2010, Eur. Trans. Telecommun..

[14]  Alain Villemeur,et al.  Methods and techniques , 1992 .