The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted Computing.

Peter Breuer

Research output: Contribution to conferenceItempeer-review

2 Citations (Scopus)

Abstract

‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator against the unprivileged user on a computing system. It requires a processor that works natively on encrypted data in user mode, and the security barrier that protects the user is hardware-based encryption, not access. We report on progress and practical experience with our superscalar RISC class prototype processor for encrypted computing and supporting software infrastructure. This paper aims to alert the secure hardware community that encrypted computing is possibly practical, as well as theoretically plausible. It has been shown formally impossible for operator mode to read (or write to order) the plaintext form of data originating from or being operated on in the user mode of this class of processor, given that the encryption is independently secure. Now we report standard Dhrystone benchmarks for the prototype, showing performance with AES-128 like a 433 MHz classic Pentium (1 GHz base clock), thousands of times faster than other approaches
Original languageEnglish
DOIs
Publication statusPublished - 23 Apr 2018
Externally publishedYes
Event2018 IEEE European Symposium on Security and Privacy Workshops -
Duration: 23 Apr 2018 → …

Conference

Conference2018 IEEE European Symposium on Security and Privacy Workshops
Period23/04/18 → …

Fingerprint

Dive into the research topics of 'The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted Computing.'. Together they form a unique fingerprint.

Cite this