Abstract
Trust in security demanding software platforms is a very important feature. For this reason, Trusted computing group has specified a TPM hardware module that can enforce and guaranty a high trust level to all the platform’s involved entities. However, the TPM’s features can not be fully exploited in systems under extreme physical conditions. To solve this problem, the use of a special purpose hardware module, physically connected to a host security system’s device acting as a local trusted third party, has been proposed in literature. In this chapter, we describe the hardware structure of such a hardware module, called Autonomous Attestation Token (AAT) and discuss hardware resource constrains, security bottlenecks that can stem from improper design of its various components integrated in the AAT’s structure. We conclude that the efficiency of the AAT system is closely related to the efficiency of its public key encryption–decryption unit (RSA encryption–decryption module). In this book chapter, we address these issues by describing a design methodology toward a low hardware resources (small chip covered area) and side channel attack resistant RSA hardware architecture. The described hardware architectures’ implementations provide very optimistic results of very low chip covered area and high computation speed thus verifying the efficiency of the proposed algorithms and architecture design approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sklavos N, Zhang X (2007) Wireless security and cryptography: specifications and implementations. CRC Press Inc, Boca Raton
Group TC(2007) TCG TPM specification version 1.2. URL https://www.trustedcomputinggroup.org/specs/TPM/
Xiaoping Wu ZS, Zhang H (2008) Secure key management of mobile agent system using tpm-based technology on trusted computing platform. Computer science and software engineering, International conference on 3, pp 1020–1023. doi:http://doi.ieeecomputersociety.org/10.1109/CSSE.2008.256
Tan HK, Moreau L (2001) Trust relationships in a mobile agent system. In: Mobile agents, number 2240 in LNCS, Springer, Heidelberg, pp 15–30
Hein D, Toegl R (2009) An autonomous attestation token to secure mobile agents in disaster response. In: The first international ICST conference on security and privacy in mobile information and communication systems (MobiSec 2009), Torino
Fournaris AP (2010) Trust ensuring crisis management hardware module. Inf Secur J: A Global Perspect 19(2):74–83
Uwe G. Wilhelm SS, Buttya’n L (1999) Introducing trusted third parties to the mobile agent paradigm. In: Secure internet programming: security issues for mobile and distributed objects. Springer, Heidelberg, pp 471–491
Jonathan M. McCune Adrian Perrig AS, van Doorn L (2007) Turtles all the way down: research challenges in user-based attestation. In: Proceedings of the workshop on hot topics in security (HotSec). URL http://www.truststc.org/pubs/286.html
Lowe G (1995) An attack on the needham-schroeder public-key authentication protocol. Inf Process Lett 56(3):131–133
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology proceedings of crypto 99, Springer, Heidelberg, pp 388–397
Giraud C (2006) An rsa implementation resistant to fault attacks and to simple power analysis. IEEE Trans Comput 55(9):1116–1120
Vigilant D (2008) Rsa with crt: a new cost-effective solution to thwart fault attacks. In: Oswald E, Rohatgi P (eds.) CHES, Lecture notes in computer science, vol 5154. Springer, Heidelberg, pp 130–145
Joye M, Yen SM (2003) The montgomery powering ladder. In: CHES ’02: Revised papers from the 4th international workshop on cryptographic hardware and embedded systems, Springer, London, pp 291– 302
Kim CH, Quisquater JJ (2007) Fault attacks for crt based rsa: new attacks, new results, and new countermeasures. In: Sauveron D, Markantonakis C, Bilas A, Quisquater JJ (eds.) WISTP, Lecture notes in computer science, vol 4462. Springer, Heidelberg
Bhattacharya K, Ranganathan N (2008) A linear programming formulation for security aware gate sizing. In: GLSVLSI ’08: Proceedings of the 18th ACM Great Lakes symposium on VLSI. ACM, New York, pp 273–278
Tiri K, Verbauwhede I (2006) A digital design flow for secure integrated circuits. IEEE Trans CAD Integr Circuits Syst 25(7):1197–1208
Fournaris AP (2010) Fault and simple power attack resistant rsa using montgomery modular multiplication. In: Proceedings of the IEEE international symposium on circuits and systems (ISCAS2010). IEEE (30 May 2002, June 2010)
Fournaris AP, Koufopavlou OG (2005) A new rsa encryption architecture and hardware implementation based on optimized montgomery multiplication. In: ISCAS (5), IEEE, pp 4645–4648
Shieh MD, Chen JH, Wu HH, Lin WC (2008) A new modular exponentiation architecture for efficient design of rsa cryptosystem. IEEE Trans Very Large Scale Integr Syst 16(9):1151–1161
McIvor C, McLoone M, McCanny J (2004) Modified montgomery modular multiplication and rsa exponentiation techniques. IEE Proc-Comput Digital Tech 151(6):402–408
Acknowledgements
The work reported in this paper is supported by the European Commission through the SECRICOM FP7 European project under contract FP7 SEC 218123
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this paper
Cite this paper
Fournaris, A.P., Hein, D.M. (2011). Trust Management Through Hardware Means: Design Concerns and Optimizations. In: Voros, N., Mukherjee, A., Sklavos, N., Masselos, K., Huebner, M. (eds) VLSI 2010 Annual Symposium. Lecture Notes in Electrical Engineering, vol 105. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1488-5_3
Download citation
DOI: https://doi.org/10.1007/978-94-007-1488-5_3
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-1487-8
Online ISBN: 978-94-007-1488-5
eBook Packages: EngineeringEngineering (R0)