DocumentCode
568602
Title
A Novel Design of Secure and Private Circuits
Author
Gomathisankaran, Mahadevan ; Tyagi, Akhilesh
Author_Institution
Comput. Sci. & Eng., Univ. of North Texas, Denton, TX, USA
fYear
2012
fDate
19-21 Aug. 2012
Firstpage
362
Lastpage
367
Abstract
Secure and tamper evident computing systems can be built by encrypting both code and data. Even such secure execution environments assume the existence of a trusted processor boundary inside which the data and code are decrypted before actually using them for computation. This leaves such secure systems vulnerable against side-channel attacks. In general there are two approaches to solve this problem. First approach is to design cryptographic algorithms which can tolerate some information leakage. Second approach is to remove the correlation between the leaked information and the secret. We propose a novel circuit design technique which uses the second approach.
Keywords
cryptography; network synthesis; circuit design; cryptographic algorithms; encryption; information leakage; private circuits; secure circuits; secure execution environments; side channel attacks; tamper evident computing systems; trusted processor boundary; Bandwidth; Circuit synthesis; Encryption; Integrated circuit modeling; Privacy; private circuits; secure circuits; tamper resistant circuits;
fLanguage
English
Publisher
ieee
Conference_Titel
VLSI (ISVLSI), 2012 IEEE Computer Society Annual Symposium on
Conference_Location
Amherst, MA
ISSN
2159-3469
Print_ISBN
978-1-4673-2234-8
Type
conf
DOI
10.1109/ISVLSI.2012.55
Filename
6296500
Link To Document