2018
DOI: 10.1049/iet-cdt.2017.0178
|View full text |Cite
|
Sign up to set email alerts
|

Partitioned security processor architecture on FPGA platform

Abstract: Internet protocol security (IPSec), secure sockets layer (SSL)/transport layer security (TLS) and other security protocols necessitate high throughput hardware implementation of cryptographic functions. In recent literature, cryptographic functions implemented in software, application specific integrated circuit (ASIC) and field programmable gate array (FPGA). They are not necessarily optimized for throughput. Due to the various side-channel based attacks on cache and memory, and various malware based exfiltra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…The architecture with blockchain to protect severe key threats consumes 95k logic cells which is around 45% of the total logic cells available in Artix-7 FPGA. As shown in Table I articles [5], [8] and [6] proposed dedicated secret key memories which are completely isolated from processor area to prevent software threats but this architecture does not prevent incorrect use, insecure movement and non-destructions issues of keys. If any spoofing IPs or dishonest probes already exist inside the architectures of [5], [8] and [6] and try to read secret key stored in dedictaed key memory, the system will allow the key transaction to those malicious nodes.…”
Section: Implementation and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The architecture with blockchain to protect severe key threats consumes 95k logic cells which is around 45% of the total logic cells available in Artix-7 FPGA. As shown in Table I articles [5], [8] and [6] proposed dedicated secret key memories which are completely isolated from processor area to prevent software threats but this architecture does not prevent incorrect use, insecure movement and non-destructions issues of keys. If any spoofing IPs or dishonest probes already exist inside the architectures of [5], [8] and [6] and try to read secret key stored in dedictaed key memory, the system will allow the key transaction to those malicious nodes.…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…As shown in Table I articles [5], [8] and [6] proposed dedicated secret key memories which are completely isolated from processor area to prevent software threats but this architecture does not prevent incorrect use, insecure movement and non-destructions issues of keys. If any spoofing IPs or dishonest probes already exist inside the architectures of [5], [8] and [6] and try to read secret key stored in dedictaed key memory, the system will allow the key transaction to those malicious nodes. Though the dedicated key memories proposed in these article are physically isolated but can not prevent said incorrect and insecure movement of secret keys.…”
Section: Implementation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Efficient implementations of these protocols as embedded cryptosystems can be problematic, since the target devices are usually very limited in terms of power, resources and timing. Several TLS/SSL embedded cryptosystem implementations have been proposed in the literature [12][13][14][15][16][17]. OpenSSL [18,19] is the most deployed library for TLS/SSL applications through software implementations of basic cryptographic functions.…”
Section: Introductionmentioning
confidence: 99%
“…For only-software TLS/SSL implementations [17,20], servers can be overloaded with heavy cryptographic operations, which results in long response times. To alleviate this bottleneck, dedicated hardware coprocessors [12][13][14][15][16][17]21] have been proposed, as Network Security Processors (NSP), as a solution to free these severs from cryptographic operations for flexible management. Nevertheless, although effective efforts have been made [10] for the acceleration of encryption methods, NSPs can provoke an overhead of hardware resources utilization [12,16] to achieve high-performance, due to the required intensive computations within cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%