Skip to main content

Trust Management Through Hardware Means: Design Concerns and Optimizations

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 105))

Abstract

Trust in security demanding software platforms is a very important feature. For this reason, Trusted computing group has specified a TPM hardware module that can enforce and guaranty a high trust level to all the platform’s involved entities. However, the TPM’s features can not be fully exploited in systems under extreme physical conditions. To solve this problem, the use of a special purpose hardware module, physically connected to a host security system’s device acting as a local trusted third party, has been proposed in literature. In this chapter, we describe the hardware structure of such a hardware module, called Autonomous Attestation Token (AAT) and discuss hardware resource constrains, security bottlenecks that can stem from improper design of its various components integrated in the AAT’s structure. We conclude that the efficiency of the AAT system is closely related to the efficiency of its public key encryption–decryption unit (RSA encryption–decryption module). In this book chapter, we address these issues by describing a design methodology toward a low hardware resources (small chip covered area) and side channel attack resistant RSA hardware architecture. The described hardware architectures’ implementations provide very optimistic results of very low chip covered area and high computation speed thus verifying the efficiency of the proposed algorithms and architecture design approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sklavos N, Zhang X (2007) Wireless security and cryptography: specifications and implementations. CRC Press Inc, Boca Raton

    Book  MATH  Google Scholar 

  2. Group TC(2007) TCG TPM specification version 1.2. URL https://www.trustedcomputinggroup.org/specs/TPM/

  3. Xiaoping Wu ZS, Zhang H (2008) Secure key management of mobile agent system using tpm-based technology on trusted computing platform. Computer science and software engineering, International conference on 3, pp 1020–1023. doi:http://doi.ieeecomputersociety.org/10.1109/CSSE.2008.256

  4. Tan HK, Moreau L (2001) Trust relationships in a mobile agent system. In: Mobile agents, number 2240 in LNCS, Springer, Heidelberg, pp 15–30

    Google Scholar 

  5. Hein D, Toegl R (2009) An autonomous attestation token to secure mobile agents in disaster response. In: The first international ICST conference on security and privacy in mobile information and communication systems (MobiSec 2009), Torino

    Google Scholar 

  6. Fournaris AP (2010) Trust ensuring crisis management hardware module. Inf Secur J: A Global Perspect 19(2):74–83

    Article  Google Scholar 

  7. Uwe G. Wilhelm SS, Buttya’n L (1999) Introducing trusted third parties to the mobile agent paradigm. In: Secure internet programming: security issues for mobile and distributed objects. Springer, Heidelberg, pp 471–491

    Google Scholar 

  8. Jonathan M. McCune Adrian Perrig AS, van Doorn L (2007) Turtles all the way down: research challenges in user-based attestation. In: Proceedings of the workshop on hot topics in security (HotSec). URL http://www.truststc.org/pubs/286.html

  9. Lowe G (1995) An attack on the needham-schroeder public-key authentication protocol. Inf Process Lett 56(3):131–133

    Article  MATH  Google Scholar 

  10. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology proceedings of crypto 99, Springer, Heidelberg, pp 388–397

    Google Scholar 

  11. Giraud C (2006) An rsa implementation resistant to fault attacks and to simple power analysis. IEEE Trans Comput 55(9):1116–1120

    Article  Google Scholar 

  12. Vigilant D (2008) Rsa with crt: a new cost-effective solution to thwart fault attacks. In: Oswald E, Rohatgi P (eds.) CHES, Lecture notes in computer science, vol 5154. Springer, Heidelberg, pp 130–145

    Google Scholar 

  13. Joye M, Yen SM (2003) The montgomery powering ladder. In: CHES ’02: Revised papers from the 4th international workshop on cryptographic hardware and embedded systems, Springer, London, pp 291– 302

    Google Scholar 

  14. Kim CH, Quisquater JJ (2007) Fault attacks for crt based rsa: new attacks, new results, and new countermeasures. In: Sauveron D, Markantonakis C, Bilas A, Quisquater JJ (eds.) WISTP, Lecture notes in computer science, vol 4462. Springer, Heidelberg

    Google Scholar 

  15. Bhattacharya K, Ranganathan N (2008) A linear programming formulation for security aware gate sizing. In: GLSVLSI ’08: Proceedings of the 18th ACM Great Lakes symposium on VLSI. ACM, New York, pp 273–278

    Google Scholar 

  16. Tiri K, Verbauwhede I (2006) A digital design flow for secure integrated circuits. IEEE Trans CAD Integr Circuits Syst 25(7):1197–1208

    Article  Google Scholar 

  17. Fournaris AP (2010) Fault and simple power attack resistant rsa using montgomery modular multiplication. In: Proceedings of the IEEE international symposium on circuits and systems (ISCAS2010). IEEE (30 May 2002, June 2010)

    Google Scholar 

  18. Fournaris AP, Koufopavlou OG (2005) A new rsa encryption architecture and hardware implementation based on optimized montgomery multiplication. In: ISCAS (5), IEEE, pp 4645–4648

    Google Scholar 

  19. Shieh MD, Chen JH, Wu HH, Lin WC (2008) A new modular exponentiation architecture for efficient design of rsa cryptosystem. IEEE Trans Very Large Scale Integr Syst 16(9):1151–1161

    Article  Google Scholar 

  20. McIvor C, McLoone M, McCanny J (2004) Modified montgomery modular multiplication and rsa exponentiation techniques. IEE Proc-Comput Digital Tech 151(6):402–408

    Article  Google Scholar 

Download references

Acknowledgements

The work reported in this paper is supported by the European Commission through the SECRICOM FP7 European project under contract FP7 SEC 218123

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Apostolos P. Fournaris .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this paper

Cite this paper

Fournaris, A.P., Hein, D.M. (2011). Trust Management Through Hardware Means: Design Concerns and Optimizations. In: Voros, N., Mukherjee, A., Sklavos, N., Masselos, K., Huebner, M. (eds) VLSI 2010 Annual Symposium. Lecture Notes in Electrical Engineering, vol 105. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1488-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-1488-5_3

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-1487-8

  • Online ISBN: 978-94-007-1488-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics