Secure Execution Crypto Microprocessor

Slides:



Advertisements
Similar presentations
Ch-11 Project Execution and Termination. System Testing This involves two different phases with two different outputs First phase is system test planning.
Advertisements

Final Project : Pipelined Microprocessor Joseph Kim.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
White-Box Cryptography
The Advanced Encryption Standard (AES) Simplified.
TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1.
NDG-L39Introduction to ASIC Design1 Design of a Simple Customizable Microprocessor * Chapter 7 and 15, “Digital System Design and Prototyping”  Pipelined.
This Lecture: AES Key Expansion Equivalent Inverse Cipher Rijndael performance summary.
Energy Evaluation Methodology for Platform Based System-On- Chip Design Hildingsson, K.; Arslan, T.; Erdogan, A.T.; VLSI, Proceedings. IEEE Computer.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Chapter 2: Impact of Machine Architectures What is the Relationship Between Programs, Programming Languages, and Computers.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
1 CS 144r: Networks Design Projects CS 244r: Advanced Networks Design Projects HBS 4560: The Future of Business Networks Anonymizing Infrastructure February.
Pipelining By Toan Nguyen.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Types of software. Sonam Dema..
RISC and CISC. Dec. 2008/Dec. and RISC versus CISC The world of microprocessors and CPUs can be divided into two parts:
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
Management of Source Code Integrity Presented by O/o the Accountant General (A&E), Jammu and Kashmir.
Cryptography and Network Security
An Introduction Chapter Chapter 1 Introduction2 Computer Systems  Programmable machines  Hardware + Software (program) HardwareProgram.
nd NESSIE Workshop Copyright (C) NTT&MELCO 2001 Update on Camellia Camellia Design Team.
Microprocessor and Interfacing PIC Code Execution
Stanford µSequencer December Motivation Control, initialization, and constant maintenance of Avalon peripherals –Perfectly deterministic Microprocessor.
1 Towards Optimal Custom Instruction Processors Wayne Luk Kubilay Atasu, Rob Dimond and Oskar Mencer Department of Computing Imperial College London HOT.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
L. A. S. E. R Local Authority Security Enterprise Reporting System Architecture.
TEAM FRONT END ECEN 4243 Digital Computer Design.
Represents different voltage levels High: 5 Volts Low: 0 Volts At this raw level a digital computer is instructed to carry out instructions.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Securely assessing encrypted cloud storage from multiple devices Nguyen Hoang Long Supervisor : Prof. N. Asokan Advisor : Sandeep.
8086/8088 Instruction Set, Machine Codes and Addressing Modes.
Static DLX processor Understanding its architecture and available toolset.
Software. Introduction n A computer can’t do anything without a program of instructions. n A program is a set of instructions a computer carries out.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Z IGBEE and OSAL Jaehoon Woo KNU RTLAB. KNU RTLAB.
Bootloaders Many embedded processors have flash memory. This allows us to alter a product even though it is in the users hands: -fix bugs -upgrade or enhance.
Bootloaders Many embedded processors have flash memory. This allows us to alter a product even though it is in the users hands: -fix bugs -upgrade or.
Hardware Protection Against Software Piracy
ECE 353 Lab 3 Pipeline Simulator
Embedded Systems Serial-Ethernet Converter Cem KEFELI
Triple DES.
1. Introduction A microprocessor executes instructions given by the user Instructions should be in a language known to the microprocessor Microprocessor.
Running An Encrypted Java Program
Simplified IDEA Cryptography and Network Security.
Hardware Support for Embedded Operating System Security
Digital Signatures Last Updated: Oct 14, 2017.
Instruction cycle Instruction: A command given to the microprocessor to perform an operation Program : A set of instructions given in a sequential.
Mobile Development Workshop
Computer Organization & Compilation Process
Some Real Machines Intel® M80C186 CHMOS High Integration 16-bit Microprocessor Intel® Itanium™ 64-bit Microprocessor (IA-64)
Programming Languages
المدخل إلى تكنولوجيا التعليم في ضوء الاتجاهات الحديثة
Protect Your Hardware from Hacking and Theft
مهارات التدريس الفعال.
Figure 4- 1: Flowchart for Example 4-3
Chapter 1 Introduction.
Chapter 1 Introduction.
Advanced Encryption Standard
Program Execution.
Homework #2 J. H. Wang Oct. 18, 2018.
Hashing Hash are the auxiliary values that are used in cryptography.
Computer Organization & Compilation Process
CS334: MIPS language _Mars simulator Lab 2_1
Figure 7-1: Non-Pipelined Instruction Execution vs. 2-stage Pipeline
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
Advanced Encryption Standard
How to Use Charm Crypto Lib
Presentation transcript:

Secure Execution Crypto Microprocessor Abdel-Karim R. Al Tamimi

Contents What is secure execution ? What are the benefits ? Implementation Assembler Questions ? Abdel-Karim R. Al Tamimi

What is Secure Execution ? Wants to Update Sensors’ Code 010 110 Enc Code Enc Code Enc Code Enc Code Enc Code 110 011 001 Abdel-Karim R. Al Tamimi

Security down to instruction level. Every instruction is encrypted. What are the benefits? Security down to instruction level. Every instruction is encrypted. Built-in encryption capabilities. Output can be encrypted Effective software registration. I need new software Encrypted Software Description Machine ID Decrypt & Execute Abdel-Karim R. Al Tamimi

Implementation Flow of data Decryption stage Encryption stage Encrypted Instruction Encrypted results Encrypted Results 128-bit Instructions 32-bit Instructions Results Using Rijndael (AES) Using Rijndael (AES) Abdel-Karim R. Al Tamimi

Implementation   32-bit data 1010 1001 128-bit Enc. Data 32-bit Abdel-Karim R. Al Tamimi

Abdel-Karim R. Al Tamimi

Question ? Questions ? Abdel-Karim R. Al Tamimi