• DocumentCode
    943546
  • Title

    Trustworthy Computing under Resource Constraints with the DOWN Policy

  • Author

    Ramkumar, Mahalingam

  • Author_Institution
    Mississippi State Univ., Starkville
  • Volume
    5
  • Issue
    1
  • fYear
    2008
  • Firstpage
    49
  • Lastpage
    61
  • Abstract
    Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a serious limiting factor. However, inexpensive trustworthy computers are required for many evolving application scenarios. The problem of realizing inexpensive ScPs for large-scale networks consisting of low-complexity devices have not received adequate consideration thus far. We introduce two strategies toward realizing low-cost ScPs. The first is the decrypt only when necessary (DOWN) policy, which can substantially improve the ability of low-cost ScPs to protect their secrets. The DOWN policy relies on the ability to operate with fractional parts of secrets. Taking full advantage of the DOWN policy requires consideration of the nature of computations performed with secrets and even the mechanisms employed for distribution of secrets. We discuss the feasibility of extending the DOWN policy to various asymmetric and symmetric cryptographic primitives. The second is cryptographic authentication strategies which employ only symmetric cryptographic primitives, based on novel ID-based key predistribution schemes that demand very low complexity of operations to be performed by the ScP and can take good advantage of the DOWN policy.
  • Keywords
    cryptography; DOWN policy; ID-based key predistribution schemes; cryptographic authentication strategies; decrypt-only-when-necessary policy; large-scale networks; low-complexity devices; resource constraints; secure coprocessors; serious limiting factor; symmetric cryptographic primitives; trustworthy computing; Mobile Computing; Security; and protection; integrity;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2007.70227
  • Filename
    4358712