Title :
High efficiency counter mode security architecture via prediction and precomputation
Author :
Shi, Weidong ; Lee, Hsien-Hsin S. ; Ghosh, Mrinmoy ; Lu, Chenghuai ; Boldyreva, Alexandra
Author_Institution :
Sch. of Electr. & Comput. Eng., Technol. Inst., Atlanta, GA, USA
Abstract :
Encrypting data in unprotected memory has gained much interest lately for digital rights protection and security reasons. Counter mode is a well-known encryption scheme. It is a symmetric-key encryption scheme based on any block cipher, e.g. AES. The scheme´s encryption algorithm uses a block cipher, a secret key and a counter (or a sequence number) to generate an encryption pad which is XORed with the data stored in memory. Like other memory encryption schemes, this method suffers from the inherent latency of decrypting encrypted data when loading them into the on-chip cache. In this paper, we present a novel technique to hide the latency overhead of decrypting counter mode encrypted memory by predicting the sequence number and pre-computing the encryption pad that we call one-time-pad or OTP. In contrast to the prior techniques of sequence number caching, our mechanism solves the latency issue by using idle decryption engine cycles to speculatively predict and pre-compute OTPs before the corresponding sequence number is loaded. This technique incurs very little area overhead. In addition, a novel adaptive OTP prediction technique is also presented to further improve our regular OTP prediction and precomputation mechanism. This adaptive scheme is not only able to predict encryption pads associated with static and infrequently updated cache lines but also those frequently updated ones as well. Experimental results using SPEC2000 benchmark show an 82% prediction rate. Moreover, we also explore several optimization techniques for improving the prediction accuracy. Two specific techniques, two-level prediction and context-based prediction are presented and evaluated.
Keywords :
cache storage; cryptography; optimisation; OTP precomputation; OTP prediction; block cipher; context-based prediction; counter mode security architecture; data encryption; digital rights protection; idle decryption engine cycle; one-time-pad; optimization; sequence number caching; symmetric-key encryption; two-level prediction; Computer architecture; Coprocessors; Counting circuits; Cryptography; Data engineering; Data privacy; Data security; Delay; Information security; Protection;
Conference_Titel :
Computer Architecture, 2005. ISCA '05. Proceedings. 32nd International Symposium on
Print_ISBN :
0-7695-2270-X
DOI :
10.1109/ISCA.2005.30