Abstract
The fact that secrets assigned to need to be stored, and computations using them performed, inside a tamper-responsive environment places some additional constraints. One significant problem in the implementation of tamper-responsive modules stems from remnance in volatile memory regions which permits attackers to expose secrets from scavenging foot-prints left behind. A simple security policy — the decrypt only when necessary (DOWN) policy can limit the number of secrets exposed from such an attack. The DOWN policy obviates the need to use inherently vulnerable, and more expensive, multi-step countermeasures as a response to suspected attacks on the integrity of trustworthy modules. Using PKPSs with the DOWN policy, and the DOWN assurance that not more than one secret can be exposed by tampering with a module, has an effect both on the overhead and the security of PKPSs. This chapter provides an in-depth discussion of the effect of using the DOWN policy. The Chapter also lays down algorithms to be executed description inside tamper-responsive boundaries for computing pairwise secrets using different approaches. A more generalized form of the atomic relay algorithm that leverages algorithms for computing pairwise secrets is also provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For clean erasure of contents stored for long durations in DRAM the only option (apart from heating) may be to store some random value for a long duration to “dilute the stress” [84] imposed on the oxide layer by the old data.
- 2.
Most such optimizations involve exponentiating with the private key in \(\mathbb{Z}_p\) and \(\mathbb{Z}_q\) where n = pq is the RSA modulus. Thus both the exponent and the modulus (p and q) have to be protected, which may not be feasible.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ramkumar, M. (2014). Using PKPSs with Tamper-Responsive Modules. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-07584-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07583-9
Online ISBN: 978-3-319-07584-6
eBook Packages: EngineeringEngineering (R0)