33rd International Symposium on Computer Architecture (ISCA'06)
DOI: 10.1109/isca.2006.22
|View full text |Cite
|
Sign up to set email alerts
|

Improving Cost, Performance, and Security of Memory Encryption and Authentication

Abstract: Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory encryption/authentication scheme. Our new split counters for counter-mode encryption simultaneously eliminate counter overflow problems and reduce per-block counter size, and we also dramatically improve authentication performance and security by using the Galois/Counter Mode of operation (GCM), which leverages counter-mode encryption to red… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…Through the experiment, we conclude that the block cipher does generate unique keys for different inputs and the key values generated are random. With the given security evaluation Formulas (1) and (5), we evaluated the security of designs proposed in [3] (a COB design) and [6] (a RNCB design), based on the block cipher AES and 128-bit block size. Attack success probabilities of the two designs against the random and used-key attacks are summarized in Table 1.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Through the experiment, we conclude that the block cipher does generate unique keys for different inputs and the key values generated are random. With the given security evaluation Formulas (1) and (5), we evaluated the security of designs proposed in [3] (a COB design) and [6] (a RNCB design), based on the block cipher AES and 128-bit block size. Attack success probabilities of the two designs against the random and used-key attacks are summarized in Table 1.…”
Section: Methodsmentioning
confidence: 99%
“…Given such a design, for each k-bit key, m-bit memory address, only k − m-bit counter value needs to be saved. To further reduce the storage memory consumption, a design with two-level counters was proposed [3] (Figure 2(b)); it consumes less on-chip memory than the one-level counter design, but may incurs re-encryption when the second level counter is overflowed. An alternative solution for reducing the memory consumption is the design proposed in [6] (as shown in Figure 2(c)).…”
Section: Background Of Dynamic Key Design For Memory Data Encryption mentioning
confidence: 99%
See 1 more Smart Citation
“…However, their architecture assumes extensive operating system and compiler support. Yan [18] describes a sign-and-verify architecture using Galois/Counter Mode cryptography. They protect dynamic data using split sequence numbers to reduce memory overhead and reduce the probability of a sequence number rollover.…”
Section: Related Workmentioning
confidence: 99%
“…The second category of the proposed solutions for memory encryption is based on hardware modifications. In particular, several publications [18][19][20][21][22][23] [40] for single processor systems propose the addition of an encryption unit to cipher and decipher data from and to the volatile memory. Moreover, for multiprocessor systems, [24] proposes a shared bus, containing a crypto engine, to coordinate and secure traffic between processors, while [25] [26] proposed the use of sequence numbers for the coordination between different processors.…”
Section: Related Workmentioning
confidence: 99%