You can view the full text of this article for free using the link below.

Title: Fully encrypted high-speed microprocessor architecture: the secret computer in simulation

Authors: Peter T. Breuer; Jonathan P. Bowen

Addresses: Hecusys LLC, P.O. Box 19124 Atlanta, GA, 31126, USA ' School of Engineering, London South Bank University, Borough Road, London SE1 0AA, UK

Abstract: The architecture of an encrypted high-performance microprocessor designed on the principle that a nonstandard arithmetic generates encrypted processor states is described here. Data in registers, in memory and on buses exists in encrypted form. Any block encryption is feasible, in principle. The processor is (initially) intended for cloud-based remote computation. An encrypted version of the standard OpenRISC instruction set is understood by the processor. It is proved here, for programs written in a minimal subset of instructions, that the platform is secure against 'Iago' attacks by the privileged operator or a subverted operating system, which cannot decrypt the program output, nor change the program's output to a particular value of their choosing. Performance measures from cycle-accurate behavioural simulation of the platform are given for 64-bit RC2 (symmetric, keyed) and 72-bit Paillier (asymmetric, additively homomorphic, no key in-processor) encryptions. Measurements are centred on a nominal 1 GHz clock with 3 ns cache and 15 ns memory latency, which is conservative with respect to available technology.

Keywords: computer security; encrypted computing.

DOI: 10.1504/IJCCBS.2019.098797

International Journal of Critical Computer-Based Systems, 2019 Vol.9 No.1/2, pp.26 - 55

Accepted: 08 Jun 2018
Published online: 02 Apr 2019 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article