Quick Boot of Trusted Execution Environment With Hardware Accelerators

The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secur...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2020, Vol.8, p.74015-74023
Hauptverfasser: Hoang, Trong-Thuc, Duran, Ckristian, Nguyen-Hoang, Duc-Thinh, Le, Duc-Hung, Tsukamoto, Akira, Suzaki, Kuniyasu, Pham, Cong-Kha
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 74023
container_issue
container_start_page 74015
container_title IEEE access
container_volume 8
creator Hoang, Trong-Thuc
Duran, Ckristian
Nguyen-Hoang, Duc-Thinh
Le, Duc-Hung
Tsukamoto, Akira
Suzaki, Kuniyasu
Pham, Cong-Kha
description The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.
doi_str_mv 10.1109/ACCESS.2020.2987617
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9064723</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9064723</ieee_id><doaj_id>oai_doaj_org_article_7ddd52af47504a3abeaed4003f63c286</doaj_id><sourcerecordid>2454092202</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</originalsourceid><addsrcrecordid>eNpNkNtKw0AQhoMoKLVP4E3A69Q9ZQ-XNUQtCCKteLmsu7OaWrO62Xh4e1NTinMzwzD_PzNflp1hNMMYqYt5VdXL5YwggmZEScGxOMhOCOaqoCXlh__q42zadWs0hBxapTjJru77xr7mlyGkPPh8Ffsugcvrb7B9akKb1-1nE0P7Bm3KH5v0kt-Y6L5MhHxuLWwgmhRid5odebPpYLrLk-zhql5VN8Xt3fWimt8WliGZClViT5QS0tFSYCIIxUJaThTGnClOqVTIGvAUlJKWOuakR1QwJp68Vbikk2wx-rpg1vo9Nm8m_uhgGv3XCPFZm5gauwEtnHMlMZ6JEjFDzRMYcAwh6jm1RPLB63z0eo_ho4cu6XXoYzucrwkrGVJkQDpM0XHKxtB1Efx-K0Z6y1-P_PWWv97xH1Rno6oBgL1CIc6Gn-kvKEx_AA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2454092202</pqid></control><display><type>article</type><title>Quick Boot of Trusted Execution Environment With Hardware Accelerators</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hoang, Trong-Thuc ; Duran, Ckristian ; Nguyen-Hoang, Duc-Thinh ; Le, Duc-Hung ; Tsukamoto, Akira ; Suzaki, Kuniyasu ; Pham, Cong-Kha</creator><creatorcontrib>Hoang, Trong-Thuc ; Duran, Ckristian ; Nguyen-Hoang, Duc-Thinh ; Le, Duc-Hung ; Tsukamoto, Akira ; Suzaki, Kuniyasu ; Pham, Cong-Kha</creatorcontrib><description>The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2020.2987617</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Accelerators ; Algorithms ; Applications programs ; Computer architecture ; Curves ; Ed25519 ; Generators ; Hardware ; Microprocessors ; Registers ; RISC ; RISC-V ; Security ; SHA-3 ; Software ; Software algorithms ; TEE</subject><ispartof>IEEE access, 2020, Vol.8, p.74015-74023</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</citedby><cites>FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</cites><orcidid>0000-0002-4078-0836</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9064723$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Duran, Ckristian</creatorcontrib><creatorcontrib>Nguyen-Hoang, Duc-Thinh</creatorcontrib><creatorcontrib>Le, Duc-Hung</creatorcontrib><creatorcontrib>Tsukamoto, Akira</creatorcontrib><creatorcontrib>Suzaki, Kuniyasu</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><title>Quick Boot of Trusted Execution Environment With Hardware Accelerators</title><title>IEEE access</title><addtitle>Access</addtitle><description>The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.</description><subject>Accelerators</subject><subject>Algorithms</subject><subject>Applications programs</subject><subject>Computer architecture</subject><subject>Curves</subject><subject>Ed25519</subject><subject>Generators</subject><subject>Hardware</subject><subject>Microprocessors</subject><subject>Registers</subject><subject>RISC</subject><subject>RISC-V</subject><subject>Security</subject><subject>SHA-3</subject><subject>Software</subject><subject>Software algorithms</subject><subject>TEE</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkNtKw0AQhoMoKLVP4E3A69Q9ZQ-XNUQtCCKteLmsu7OaWrO62Xh4e1NTinMzwzD_PzNflp1hNMMYqYt5VdXL5YwggmZEScGxOMhOCOaqoCXlh__q42zadWs0hBxapTjJru77xr7mlyGkPPh8Ffsugcvrb7B9akKb1-1nE0P7Bm3KH5v0kt-Y6L5MhHxuLWwgmhRid5odebPpYLrLk-zhql5VN8Xt3fWimt8WliGZClViT5QS0tFSYCIIxUJaThTGnClOqVTIGvAUlJKWOuakR1QwJp68Vbikk2wx-rpg1vo9Nm8m_uhgGv3XCPFZm5gauwEtnHMlMZ6JEjFDzRMYcAwh6jm1RPLB63z0eo_ho4cu6XXoYzucrwkrGVJkQDpM0XHKxtB1Efx-K0Z6y1-P_PWWv97xH1Rno6oBgL1CIc6Gn-kvKEx_AA</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Hoang, Trong-Thuc</creator><creator>Duran, Ckristian</creator><creator>Nguyen-Hoang, Duc-Thinh</creator><creator>Le, Duc-Hung</creator><creator>Tsukamoto, Akira</creator><creator>Suzaki, Kuniyasu</creator><creator>Pham, Cong-Kha</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-4078-0836</orcidid></search><sort><creationdate>2020</creationdate><title>Quick Boot of Trusted Execution Environment With Hardware Accelerators</title><author>Hoang, Trong-Thuc ; Duran, Ckristian ; Nguyen-Hoang, Duc-Thinh ; Le, Duc-Hung ; Tsukamoto, Akira ; Suzaki, Kuniyasu ; Pham, Cong-Kha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Accelerators</topic><topic>Algorithms</topic><topic>Applications programs</topic><topic>Computer architecture</topic><topic>Curves</topic><topic>Ed25519</topic><topic>Generators</topic><topic>Hardware</topic><topic>Microprocessors</topic><topic>Registers</topic><topic>RISC</topic><topic>RISC-V</topic><topic>Security</topic><topic>SHA-3</topic><topic>Software</topic><topic>Software algorithms</topic><topic>TEE</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Duran, Ckristian</creatorcontrib><creatorcontrib>Nguyen-Hoang, Duc-Thinh</creatorcontrib><creatorcontrib>Le, Duc-Hung</creatorcontrib><creatorcontrib>Tsukamoto, Akira</creatorcontrib><creatorcontrib>Suzaki, Kuniyasu</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hoang, Trong-Thuc</au><au>Duran, Ckristian</au><au>Nguyen-Hoang, Duc-Thinh</au><au>Le, Duc-Hung</au><au>Tsukamoto, Akira</au><au>Suzaki, Kuniyasu</au><au>Pham, Cong-Kha</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Quick Boot of Trusted Execution Environment With Hardware Accelerators</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2020</date><risdate>2020</risdate><volume>8</volume><spage>74015</spage><epage>74023</epage><pages>74015-74023</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2020.2987617</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-4078-0836</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2020, Vol.8, p.74015-74023
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_9064723
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Accelerators
Algorithms
Applications programs
Computer architecture
Curves
Ed25519
Generators
Hardware
Microprocessors
Registers
RISC
RISC-V
Security
SHA-3
Software
Software algorithms
TEE
title Quick Boot of Trusted Execution Environment With Hardware Accelerators
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T16%3A24%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Quick%20Boot%20of%20Trusted%20Execution%20Environment%20With%20Hardware%20Accelerators&rft.jtitle=IEEE%20access&rft.au=Hoang,%20Trong-Thuc&rft.date=2020&rft.volume=8&rft.spage=74015&rft.epage=74023&rft.pages=74015-74023&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2020.2987617&rft_dat=%3Cproquest_ieee_%3E2454092202%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2454092202&rft_id=info:pmid/&rft_ieee_id=9064723&rft_doaj_id=oai_doaj_org_article_7ddd52af47504a3abeaed4003f63c286&rfr_iscdi=true