• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Processor Architecture with Program Protection Feature Using Cryptography

Research Project

Project/Area Number 17500044
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Computer system/Network
Research InstitutionHiroshima City University

Principal Investigator

KITAMURA Toshiaki  Hiroshima City University, Faculty of Information Sciences, Professor, 情報科学部, 教授 (10324683)

Project Period (FY) 2005 – 2006
Project Status Completed (Fiscal Year 2006)
Budget Amount *help
¥3,200,000 (Direct Cost: ¥3,200,000)
Fiscal Year 2006: ¥1,500,000 (Direct Cost: ¥1,500,000)
Fiscal Year 2005: ¥1,700,000 (Direct Cost: ¥1,700,000)
Keywordssecure processor / public-key cryptography / processor architecture / copyright protection for programs
Research Abstract

1. Proposal of a secure processor
We have proposed a new type of secure processor which has these features:
1)encrypt only on program, not on data, 2)decryption key is selected based on virtual memory system not on process basis as usual, i.e. each page can be related to key in order to encrypt shared libraries;
2. Feasibility study on proposed secure processor
We evaluated DES and AES cryptosystem by designing by RTL level, and the point of hardware amount and decryption time, both systems are not so different. So, we employ AES, because of its superior security.
We designed a RTL model and software simulator of proposed secure processor based on ARM-like embedded processor to evaluate the increase of hardware and the degradation of performance. By this evaluation, we can conclude the demerits of this proposal are acceptable.
3. Penetration test for our secure processor
As our secure processor does not encrypt on data, we afraid the instructions are identified by observing the results of each instruction result with many input data. We assume three conditions: 1) adversary can use privileged function. 2) Adversary can probe memory bus and get memory access address and data by resolution of cache line size. 3)adversary can execute single target instruction using external interrupt or something; and we find the instruction can be identified one by one by several to several tens executions with deferent sets of register values. To protect program, we must consider some conditions will be restricted.

Report

(3 results)
  • 2006 Annual Research Report   Final Research Report Summary
  • 2005 Annual Research Report
  • Research Products

    (7 results)

All 2006 2005

All Journal Article (7 results)

  • [Journal Article] 公開鍵暗号を用いてプログラムの保護を行うプロセッサの提案2006

    • Author(s)
      城本 正尋
    • Journal Title

      社団法人 情報処理学会 論文誌 コンピューティングシステム SIG 18(ACS 16)

      Pages: 55-64

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] プログラム保護を行うプロセッサの公開鍵暗号ハードウェアの評価2006

    • Author(s)
      酒井 智也
    • Journal Title

      社団法人 情報処理学会 研究報告 2006-ARC-170

      Pages: 19-24

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Annual Research Report 2006 Final Research Report Summary
  • [Journal Article] A Processor with Program Protection Feature by use of Public Key Cryptosystem2006

    • Author(s)
      Masahiro Shiromoto, et al.
    • Journal Title

      IPSJ Transaction on Advanced Computer System Vol.47, No.SIG18(ACS 16)

      Pages: 55-64

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] Evaluation of Public Key Cryptosystem2006

    • Author(s)
      Tomoya Sakai, et al.
    • Journal Title

      Hardware of Processor that has Program Protection Feature IPSJ SIG Technical Reports 2006-ARC-170

      Pages: 19-24

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary
  • [Journal Article] 公開鍵暗号を用いてプログラムの保護を行うプロセッサの提案2006

    • Author(s)
      城本 正尋
    • Journal Title

      社団法人 情報処理学会 論文誌 コンピューティングシステム SIG 18 (ACS 16)

      Pages: 55-64

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 公開鍵暗号を用いてプログラムの保護を行うプロセッサの開発2005

    • Author(s)
      城本 正尋
    • Journal Title

      社団法人 情報処理学会 研究報告 2005-ARC-165

      Pages: 21-26

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2006 Final Research Report Summary 2005 Annual Research Report
  • [Journal Article] Development of Processor that has Program Protection Feature by use of Public Key Cryptosystem2005

    • Author(s)
      Masahiro Shiromoto, et al.
    • Journal Title

      IPSJ SIG Technical Reports 2005-ARC-165

      Pages: 21-26

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2006 Final Research Report Summary

URL: 

Published: 2005-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi