Quick Boot of Trusted Execution Environment With Hardware Accelerators
Autor: | Akira Tsukamoto, Ckristian Duran, Duc-Hung Le, Trong-Thuc Hoang, Kuniyasu Suzaki, Duc-Thinh Nguyen-Hoang, Cong-Kha Pham |
---|---|
Rok vydání: | 2020 |
Předmět: |
Scheme (programming language)
Authentication General Computer Science business.industry Computer science Hash function General Engineering SHA-3 RISC-V Privilege (computing) Ed25519 Signature (logic) TEE Elliptic curve Software General Materials Science lcsh:Electrical engineering. Electronics. Nuclear engineering Isolation (database systems) business lcsh:TK1-9971 Throughput (business) computer Computer hardware computer.programming_language |
Zdroj: | IEEE Access, Vol 8, Pp 74015-74023 (2020) |
ISSN: | 2169-3536 |
DOI: | 10.1109/access.2020.2987617 |
Popis: | The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times. |
Databáze: | OpenAIRE |
Externí odkaz: |