Transparent Memory Encryption and Authentication

Mario Werner, Thomas Unterluggauer, Stefan Mangard

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

Abstract

Security features of modern (SoC) FPGAs permit to protect the confidentiality of hard- and software IP when the devices are powered off as well as to validate the authenticity of IP when being loaded at startup. However, these approaches are insufficient since attackers with physical access can also perform attacks during runtime, demanding for additional security measures. In particular, RAM used by modern (SoC) FPGAs is under threat since RAM stores software IP as well as all kinds of other sensitive information during runtime. To solve this issue, we present an open-source framework for building transparent RAM encryption and authentication pipelines, suitable for both FPGAs and ASICs. The framework supports various ciphers and modes of operation as shown by our comprehensive evaluation on a Xilinx Zynq-7020 SoC. For encryption, the ciphers Prince and AES are used in the ECB, CBC and XTS mode. Additionally, the authenticated encryption cipher Ascon is used both standalone and within a TEC tree. Our results show that the data processing of our encryption pipeline is highly efficient with up to 94 % utilization of the read bandwidth that is provided by the FPGA interface. Moreover, the use of a cryptographically strong primitive like Ascon yields highly practical results with 54 % bandwidth utilization.
Originalspracheenglisch
Titel27th International Conference on Field Programmable Logic and Applications - FPL 2017
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers
DOIs
PublikationsstatusVeröffentlicht - 5 Okt 2017
Veranstaltung27th International Conference on Field Programmable Logic and Applications - Belgium, Ghent
Dauer: 4 Sep 20178 Sep 2017
Konferenznummer: 2017

Konferenz

Konferenz27th International Conference on Field Programmable Logic and Applications
KurztitelFPL
OrtGhent
Zeitraum4/09/178/09/17

Fingerprint

Untersuchen Sie die Forschungsthemen von „Transparent Memory Encryption and Authentication“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren