Abstract

The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.

Highlights

  • We present a RISC-V system for Trusted Execution Environment (TEE) that includes hardware acceleration on the SHA-3 secure hash algorithm and the Ed25519 elliptic curve algorithm

  • The logic increases between the Ed25519 accelerators, there is a significant increase in the usage of Digital Signal Processors (DSP) from 3.7% to 10% caused by bigger calculation units in the rounding machine

  • In this paper, we presented a system for TEEs featuring SHA-3 and Ed25519 accelerators

Read more

Summary

INTRODUCTION

Trusted Execution Environment (TEE) prevents unauthenticated code from running by using hashing, certificate signing, and cryptography. Some studies have been demonstrated the security of hardware-based TEEs like ARM TrustZone and Intel SGX. Keystone is a framework for RISC-V processors that takes advantage of the physical memory protection standard to authenticate the execution of programs in a safe environment [21]. We present a RISC-V system for TEEs that includes hardware acceleration on the SHA-3 secure hash algorithm and the Ed25519 elliptic curve algorithm. The signature procedure performs the signature equation of the Ed25519, wrapping it automatically over the large prime [26] These accelerators are used in the TEE boot procedure, which utilizing the Keystone framework as the base environment [21].

HARDWARE IMPLEMENTATION
RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.