Academic Journal

Architecture for protecting critical secrets in microprocessors

التفاصيل البيبلوغرافية
العنوان: Architecture for protecting critical secrets in microprocessors
المؤلفون: Ruby B. Lee, Peter C. S. Kwan, John P. Mcgregor, Jeffrey Dwoskin, Zhenghong Wang
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://pages.cs.wisc.edu/~isca2005/papers/01-01.PDF.
سنة النشر: 2005
المجموعة: CiteSeerX
الوصف: We propose “secret-protected (SP) ” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of critical secrets, and key protection and management is a fundamental problem – often assumed but not solved – underlying the use of cryptographic protection of sensitive files, messages, data and programs. SP-processors contain a minimalist set of architectural features that can be built into a general-purpose microprocessor to provide protection of critical secrets and their computations, without expensive or inconvenient auxiliary hardware. SP-architecture also requires a trusted software module, a few modifications to the operating system, a secure I/O path to the user, and a secure installation process. Unique aspects of our architecture include: decoupling of user secrets from the devices, enabling users to securely access their keys from different networked computing devices; the use of symmetric master keys rather than more costly public-private key pairs; and the avoidance of any permanent or factory-installed device secrets. 1 1.
نوع الوثيقة: text
اللغة: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.1941; http://pages.cs.wisc.edu/~isca2005/papers/01-01.PDF
الاتاحة: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.1941
http://pages.cs.wisc.edu/~isca2005/papers/01-01.PDF
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
رقم الانضمام: edsbas.23BA4DC9
قاعدة البيانات: BASE