2017 International Carnahan Conference on Security Technology (ICCST) 2017
DOI: 10.1109/ccst.2017.8167847
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted computing: Speed, security and provable obfuscation against insiders

Abstract: Abstract-Over the past few years we have articulated theory that describes 'encrypted computing', in which data remains in encrypted form while being worked on inside a processor, by virtue of a modified arithmetic. The last two years have seen research and development on a standards-compliant processor that shows that near-conventional speeds are attainable via this approach. Benchmark performance with the US AES-128 flagship encryption and a 1 GHz clock is now equivalent to a 433 MHz classic Pentium, and mos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
(29 reference statements)
0
2
0
Order By: Relevance
“…The modifications not only put aside those instructions used explicitly in the attack, but they also formally generate arbitrarily many equally plausible numerical interpretations of the inputs to and outputs from each instruction, differing by a and b respectively, in the eyes of an attacker who does not yet know the encryption. The argument of Proposition 2 of this paper then may be extended to any program in the modified RISC instruction set (Breuer et al, 2017a).…”
Section: Recent Developmentsmentioning
confidence: 98%
See 1 more Smart Citation
“…The modifications not only put aside those instructions used explicitly in the attack, but they also formally generate arbitrarily many equally plausible numerical interpretations of the inputs to and outputs from each instruction, differing by a and b respectively, in the eyes of an attacker who does not yet know the encryption. The argument of Proposition 2 of this paper then may be extended to any program in the modified RISC instruction set (Breuer et al, 2017a).…”
Section: Recent Developmentsmentioning
confidence: 98%
“…In further work since this paper was submitted, we have extended the theory in Section 6, introducing in Breuer et al (2017a) a modified RISC instruction set that covers the full range of conventional RISC instruction forms. The special feature of the modified instructions is that each embeds encrypted constants that vary the semantics.…”
Section: Recent Developmentsmentioning
confidence: 99%