Skip to main content

Using PKPSs with Tamper-Responsive Modules

  • Chapter
  • First Online:
Symmetric Cryptographic Protocols
  • 552 Accesses

Abstract

The fact that secrets assigned to need to be stored, and computations using them performed, inside a tamper-responsive environment places some additional constraints. One significant problem in the implementation of tamper-responsive modules stems from remnance in volatile memory regions which permits attackers to expose secrets from scavenging foot-prints left behind. A simple security policy — the decrypt only when necessary (DOWN) policy can limit the number of secrets exposed from such an attack. The DOWN policy obviates the need to use inherently vulnerable, and more expensive, multi-step countermeasures as a response to suspected attacks on the integrity of trustworthy modules. Using PKPSs with the DOWN policy, and the DOWN assurance that not more than one secret can be exposed by tampering with a module, has an effect both on the overhead and the security of PKPSs. This chapter provides an in-depth discussion of the effect of using the DOWN policy. The Chapter also lays down algorithms to be executed description inside tamper-responsive boundaries for computing pairwise secrets using different approaches. A more generalized form of the atomic relay algorithm that leverages algorithms for computing pairwise secrets is also provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For clean erasure of contents stored for long durations in DRAM the only option (apart from heating) may be to store some random value for a long duration to “dilute the stress” [84] imposed on the oxide layer by the old data.

  2. 2.

    Most such optimizations involve exponentiating with the private key in \(\mathbb{Z}_p\) and \(\mathbb{Z}_q\) where n = pq is the RSA modulus. Thus both the exponent and the modulus (p and q) have to be protected, which may not be feasible.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahalingam Ramkumar .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ramkumar, M. (2014). Using PKPSs with Tamper-Responsive Modules. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07584-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07583-9

  • Online ISBN: 978-3-319-07584-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics