Skip to main content

Architecture Considerations for Massively Parallel Hardware Security Platform

Building a Workhorse for Cryptography as a Service

  • Conference paper
  • First Online:
Security, Privacy, and Applied Cryptography Engineering (SPACE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9354))

  • 942 Accesses

Abstract

Cryptography as a service (CaaS) provides means for executing sensitive cryptographic operations when the primary computing platform does not offer the required level of trust and security. Instead of executing operations like document signing directly by an application running in untrusted environment, the operation keys are only present in trusted environment used by CaaS. Once the operation keys are put in place, the applications use a CaaS interface to obtain results of sensitive operations - document signatures - executed by CaaS. A typical scenario is the use of virtual computing platform in the cloud. Use of CaaS reduces impact of the potential compromise of this virtual platform and simplifies subsequent recovery. The attacker will not learn the value of sensitive keys (e.g., signing keys) and is only able to use the keys for a limited time. The CaaS is enabling technology for a large number of use cases where security is important. The concept of scalable and universally available CaaS has also far-reaching usability, security, legal, and economics consequences of cloud use. In this position paper, we focus on requirements for building a CaaS platform – what are the options and challenges to build hardware and software components for CaaS suitable for usage scenarios with different load patterns and user requirements. We propose a suitable architecture for CaaS that can be shared by a large number of concurrent users, i.e., providing access to a large number of cryptographic keys. We also provide practical results from our prototype implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CryptLib++ project, http://www.cryptlib.com/ (July 12, 2015)

  2. OpenSSL project, https://openssl.org (July 12, 2015)

  3. NVIDIAs next generation CUDA compute architecture: Fermi. NVIDIA (2009)

    Google Scholar 

  4. Amazon AWS. CloudHSM, https://aws.amazon.com/cloudhsm/ (July 12, 2015)

  5. Bleikertz, S., Bugiel, S., Ideler, H., Nürnberger, S., Sadeghi, A.-R.: Client-Controlled Cryptography-as-a-Service in the Cloud. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 19–36. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the Cloud: Outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 85–90. ACM (2009)

    Google Scholar 

  7. Doroz, Y., Ozturk, E., Sunar, B.: Accelerating fully homomorphic encryption in hardware. IEEE Transactions on Computers 64(6), 1509–1521 (2015)

    MathSciNet  MATH  Google Scholar 

  8. Focardi, R., Luccio, F.L., Steel, G.: An introduction to security API analysis. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 35–65. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Initiative for open authentication (OATH), http://www.openauthentication.org/ (July 12, 2015)

  10. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st ACM Symposium on Theory of Computing (STOC), pp. 169–178. ACM (2009)

    Google Scholar 

  11. Jang, K., Han, S., Han, S., Moon, S., Park, K.: SSLSshader: cheap SSL acceleration with commodity processors. In: 8th USENIX Conference on Networked Systems and Implementation, NSDI 2011. USENIX Association (2011)

    Google Scholar 

  12. Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking ciphers with COPACOBANA –a cost-optimized parallel code breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 101–118. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Lepoint, T., Naehrig, M.: A comparison of the homomorphic encryption schemes FV and YASHE. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT. LNCS, vol. 8469, pp. 318–335. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  14. M’Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: An HMAC-based one-time password algorithm. In: RFC 4226. IETF (2005)

    Google Scholar 

  15. OpenVZ. VirtualHSM project, https://openvz.org/virtual_hsm (July 12, 2015)

  16. Rankl, W., Effing, W.: Smart Card Handbook. Wiley (2004) ISBN 9780470856680

    Google Scholar 

  17. Robinson, P.: Cryptography as a service. In: RSAConference Europe 2013 (2013)

    Google Scholar 

  18. Švenda, P.: JCAlgTester project, http://www.fi.muni.cz/~xsvenda/jcsupport.html (July 12, 2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Cvrček .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Cvrček, D., Švenda, P. (2015). Architecture Considerations for Massively Parallel Hardware Security Platform. In: Chakraborty, R., Schwabe, P., Solworth, J. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2015. Lecture Notes in Computer Science(), vol 9354. Springer, Cham. https://doi.org/10.1007/978-3-319-24126-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24126-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24125-8

  • Online ISBN: 978-3-319-24126-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics