Title :
A Novel Design of Secure and Private Circuits
Author :
Gomathisankaran, Mahadevan ; Tyagi, Akhilesh
Author_Institution :
Comput. Sci. & Eng., Univ. of North Texas, Denton, TX, USA
Abstract :
Secure and tamper evident computing systems can be built by encrypting both code and data. Even such secure execution environments assume the existence of a trusted processor boundary inside which the data and code are decrypted before actually using them for computation. This leaves such secure systems vulnerable against side-channel attacks. In general there are two approaches to solve this problem. First approach is to design cryptographic algorithms which can tolerate some information leakage. Second approach is to remove the correlation between the leaked information and the secret. We propose a novel circuit design technique which uses the second approach.
Keywords :
cryptography; network synthesis; circuit design; cryptographic algorithms; encryption; information leakage; private circuits; secure circuits; secure execution environments; side channel attacks; tamper evident computing systems; trusted processor boundary; Bandwidth; Circuit synthesis; Encryption; Integrated circuit modeling; Privacy; private circuits; secure circuits; tamper resistant circuits;
Conference_Titel :
VLSI (ISVLSI), 2012 IEEE Computer Society Annual Symposium on
Conference_Location :
Amherst, MA
Print_ISBN :
978-1-4673-2234-8
DOI :
10.1109/ISVLSI.2012.55