Abstract
A t-private system consists of computing logic along with ROMs to store the persistent private keys. Ishai et al. [4] have developed a t-private logic schema with zero information loss against a probing adversary with up to t probes per cycle. Valamehr et al. [12] describe memory coding schemes to protect against a physical access adversary who observes transistor level fatigue through destructive slicing of the silicon chip. The two schemes cannot be combined to build a unified t-private system consisting of both memory and computing logic. For instance, Valamehr coding schemes do not have an associated computing logic schema. The keys after being read from ROM first have to be decoded and then re-encoded for t-private logic, opening them to probing attacks. In this paper, we propose a new unified computable t-private model to support both memory coding and logic coding. We develop the computing schema, logic preserving implementations of logic gates such as AND, OR and NOT, for the new computable t-private memories. Our computable t-private model takes fewer gates, less storage, fewer random bits than the existing schemes, and yet limits the adversary success probability. The memory is analyzed in the physical adversary framework of Valamehr, and computing logic is analyzed in the zero information loss framework of Ishai et al. [4].
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)
T. C. Group. Trusted Platform Module Specification and Architecture (2013), http://www.trustedcomputinggroup.org/resources/tpm_main_specification/
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Cal, J.A., Feldman, A.J., Felten, E.W.: Least we remember: Cold boot attacks on encryption keys. In: USENIX Security Symposium (2008)
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463–481. Springer, Heidelberg (2003)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Member, S.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51, 541–552 (2002)
Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278–296. Springer, Heidelberg (2004)
Park, J., Tyagi, A.: t-private logic synthesis on fpgas. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 63–68 (June 2012)
Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)
Samyde, D., Skorobogatov, S., Anderson, R., Quisquater, J.-J.: On a new way to read data from memory. In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, pp. 65–69. IEEE Computer Society, Washington, DC (2002)
Valamehr, J., Chase, M., Kamara, S., Putnam, A., Shumow, D., Vaikuntanathan, V., Sherwood, T.: Inspection resistant memory: architectural support for security from physical examination. In: Proceedings of the 39th Annual International Symposium on Computer Architecture, ISCA 2012, pp. 130–141. IEEE Computer Society, Washington, DC (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Park, J., Tyagi, A. (2014). t-Private Systems: Unified Private Memories and Computation. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-12060-7_19
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12059-1
Online ISBN: 978-3-319-12060-7
eBook Packages: Computer ScienceComputer Science (R0)