1999
DOI: 10.1016/s1389-1286(98)00019-x
|View full text |Cite
|
Sign up to set email alerts
|

Building a high-performance, programmable secure coprocessor

Abstract: Abstract. Unsecure computational environments threaten many nancial cryptography implementations, and other sensitive computation. High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions requires overcoming numerous technical and business obstacles. These obstacles motivate building a high-performance secure coprocessor that balances security with easy third-party programmability|but these obstacles also provide many design challenges. Thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
87
0

Year Published

2001
2001
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 202 publications
(87 citation statements)
references
References 12 publications
0
87
0
Order By: Relevance
“…There are systems available to provide such tamper-resistance. For example, IBM's PCI Cryptographic Coprocessor, encapsulates a 486-class processing subsystem within a tampersensing and tamper-responding environment where one can run security-sensitive processes [SW99]. Smart cards also incorporate barriers to protect the hidden key(s), many of which have been broken [And01].…”
Section: Digital Pufmentioning
confidence: 99%
“…There are systems available to provide such tamper-resistance. For example, IBM's PCI Cryptographic Coprocessor, encapsulates a 486-class processing subsystem within a tampersensing and tamper-responding environment where one can run security-sensitive processes [SW99]. Smart cards also incorporate barriers to protect the hidden key(s), many of which have been broken [And01].…”
Section: Digital Pufmentioning
confidence: 99%
“…Another approach is to use secure co-processors (e.g. [59,64]) which "sign" the computation as correct, under the assumption that the adversary cannot tamper with the processor. Finally, other trust models have been considered.…”
Section: Related Workmentioning
confidence: 99%
“…The conventional approach to building physically secure systems (Smith and Weingart, 1999;Yee, 1994) is to encase the entire system in a tamperproof package. For example, the IBM 4758 cryptographic coprocessor contains an Intel 486 processor, a special chip for cryptographic operations, and memory modules (DRAM, flash, etc.)…”
Section: Tamper-proof Packagesmentioning
confidence: 99%