Using a high-performance, programmable secure coprocessor

  • Sean W. Smith
  • Elaine R. Palmer
  • Steve Weingart
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1465)

Abstract

Unsecure computational environments threaten many financial cryptography implementations, and other sensitive computation. High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions requires overcoming numerous technical and business obstacles. These obstacles motivate building a high-performance secure coprocessor that balances security with easy third-party programmability—but these obstacles also provide many design challenges. This paper discusses some of issues we faced when attempting to build such a device.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    D. G. Abraham, G. M. Dolan, G. P. Double, J. V. Stevens. “Transaction Security Systems.” IBM Systems Journal. 30:206–229. 1991.CrossRefGoogle Scholar
  2. 2.
    R. Anderson, M. Kuhn. “Tamper Resistance—A Cautionary Note.” The Second USENIX Workshop on Electronic Commerce. November 1996.Google Scholar
  3. 3.
    R. Anderson, M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. Preprint. 1997.Google Scholar
  4. 4.
    E. Biham, A. Shamir. Differential Fault Analysis: A New Cryptanalytic Attack on Secret Key Cryptosystems. Preprint, 1997.Google Scholar
  5. 5.
    D. Boneh, R. A. DeMillo, R. J. Lipton. On the Importance of Checking Computations. Preprint, 1996.Google Scholar
  6. 6.
    D. Chaum. “Design Concepts for Tamper Responding Systems.” CRYPTO 83.Google Scholar
  7. 7.
    B. Dole, S. Lodin, E. H. Spafford. “Misplaced Trust: Kerberos 4 Session Keys.” ISOC Conference on Network Security. 1997.Google Scholar
  8. 8.
    H. Gobioff, S. W. Smith, J. D. Tygar and B. S. Yee. “Smart Cards in Hostile Environments.” The Second USENIX Workshop on Electronic Commerce. November 1996.Google Scholar
  9. 9.
    I. Goldberg, D. Wagner. “Randomness and the Netscape Browser.” Dr. Dobb's Journal. January 1995.Google Scholar
  10. 10.
    IBM PCI Cryptographic Coprocessor. Product Brochure G325-1118. August 1997.Google Scholar
  11. 11.
    M. F. Jones and B. Schneier. “Securing the World Wide Web: Smart Tokens and their Implementation.” Fourth International World Wide Web Conference. December 1995.Google Scholar
  12. 12.
    National Institute of Standards and Technology. Security Requirements for Cryptographic Modules. Federal Information Processing Standards Publication 140–1, 1994.Google Scholar
  13. 13.
    E. R. Palmer. An Introduction to Citadel—A Secure Crypto Coprocessor for Workstations. Computer Science Research Report RC 18373, IBM T. J. Watson Research Center. September 1992.Google Scholar
  14. 14.
    S. W. Smith. Secure Coprocessing Applications and Research Issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory. August 1996.Google Scholar
  15. 15.
    S. W. Smith, S. H. Weingart. Building a High-Performance, Programmable Secure Coprocessor. Resarch Report RC21102, IBM T.J. Watson Research Center. February 1998.Google Scholar
  16. 16.
    J. D. Tygar and B. S. Yee. “Dyad: A System for Using Physically Secure Coprocessors.” Proceedings of the Joint Harvard-MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment. April 1993. (A preliminary version is available as Computer Science Technical Report CMU-CS-91-140R, Carnegie Mellon University.)Google Scholar
  17. 17.
    S. Vaudenay. “Hidden Collisions on DSS.” CRYPTO 1996. LNCS 1109.Google Scholar
  18. 18.
    S. H. Weingart. “Physical Security for the ΜABYSS System.” IEEE Computer Society Conference on Security and Privacy. 1987.Google Scholar
  19. 19.
    S. H. Weingart, S. R. White, W. C. Arnold, and G. P. Double. “An Evaluation System for the Physical Security of Computing Systems.” Sixth Annual Computer Security Applications Conference. 1990.Google Scholar
  20. 20.
    S. R. White, L. D. Comerford. “ABYSS: A Trusted Architecture for Software Protection.” IEEE Computer Society Conference on Security and Privacy. 1987.Google Scholar
  21. 21.
    S. R. White, S. H. Weingart, W. C. Arnold and E. R. Palmer. Introduction to the Citadel Architecture: Security in Physically Exposed Environments. Technical Report, Distributed Systems Security Group. IBM T. J. Watson Research Center. March 1991.Google Scholar
  22. 22.
    B. S. Yee. Using Secure Coprocessors. Ph.D. thesis. Computer Science Technical Report CMU-CS-94-149, Carnegie Mellon University. May 1994.Google Scholar
  23. 23.
    B. S. Yee, J. D. Tygar. “Secure Coprocessors in Electronic Commerce Applications.” The First USENIX Workshop on Electronic Commerce. July 1995.Google Scholar
  24. 24.
    A. Young and M. Yung. “The Dark Side of Black-Box Cryptography— or—should we trust Capstone?” CRYPTO 1996. LNCS 1109.Google Scholar

Copyright information

© Springer-Verlag 1998

Authors and Affiliations

  • Sean W. Smith
    • 1
  • Elaine R. Palmer
    • 1
  • Steve Weingart
    • 1
  1. 1.Secure Systems and Smart CardsIBM T.J. Watson Research CenterYorktown HeightsUSA

Personalised recommendations