Quick Boot of Trusted Execution Environment With Hardware Accelerators
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secur...
Gespeichert in:
Veröffentlicht in: | IEEE access 2020, Vol.8, p.74015-74023 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 74023 |
---|---|
container_issue | |
container_start_page | 74015 |
container_title | IEEE access |
container_volume | 8 |
creator | Hoang, Trong-Thuc Duran, Ckristian Nguyen-Hoang, Duc-Thinh Le, Duc-Hung Tsukamoto, Akira Suzaki, Kuniyasu Pham, Cong-Kha |
description | The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times. |
doi_str_mv | 10.1109/ACCESS.2020.2987617 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9064723</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9064723</ieee_id><doaj_id>oai_doaj_org_article_7ddd52af47504a3abeaed4003f63c286</doaj_id><sourcerecordid>2454092202</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</originalsourceid><addsrcrecordid>eNpNkNtKw0AQhoMoKLVP4E3A69Q9ZQ-XNUQtCCKteLmsu7OaWrO62Xh4e1NTinMzwzD_PzNflp1hNMMYqYt5VdXL5YwggmZEScGxOMhOCOaqoCXlh__q42zadWs0hBxapTjJru77xr7mlyGkPPh8Ffsugcvrb7B9akKb1-1nE0P7Bm3KH5v0kt-Y6L5MhHxuLWwgmhRid5odebPpYLrLk-zhql5VN8Xt3fWimt8WliGZClViT5QS0tFSYCIIxUJaThTGnClOqVTIGvAUlJKWOuakR1QwJp68Vbikk2wx-rpg1vo9Nm8m_uhgGv3XCPFZm5gauwEtnHMlMZ6JEjFDzRMYcAwh6jm1RPLB63z0eo_ho4cu6XXoYzucrwkrGVJkQDpM0XHKxtB1Efx-K0Z6y1-P_PWWv97xH1Rno6oBgL1CIc6Gn-kvKEx_AA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2454092202</pqid></control><display><type>article</type><title>Quick Boot of Trusted Execution Environment With Hardware Accelerators</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hoang, Trong-Thuc ; Duran, Ckristian ; Nguyen-Hoang, Duc-Thinh ; Le, Duc-Hung ; Tsukamoto, Akira ; Suzaki, Kuniyasu ; Pham, Cong-Kha</creator><creatorcontrib>Hoang, Trong-Thuc ; Duran, Ckristian ; Nguyen-Hoang, Duc-Thinh ; Le, Duc-Hung ; Tsukamoto, Akira ; Suzaki, Kuniyasu ; Pham, Cong-Kha</creatorcontrib><description>The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2020.2987617</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Accelerators ; Algorithms ; Applications programs ; Computer architecture ; Curves ; Ed25519 ; Generators ; Hardware ; Microprocessors ; Registers ; RISC ; RISC-V ; Security ; SHA-3 ; Software ; Software algorithms ; TEE</subject><ispartof>IEEE access, 2020, Vol.8, p.74015-74023</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</citedby><cites>FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</cites><orcidid>0000-0002-4078-0836</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9064723$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Duran, Ckristian</creatorcontrib><creatorcontrib>Nguyen-Hoang, Duc-Thinh</creatorcontrib><creatorcontrib>Le, Duc-Hung</creatorcontrib><creatorcontrib>Tsukamoto, Akira</creatorcontrib><creatorcontrib>Suzaki, Kuniyasu</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><title>Quick Boot of Trusted Execution Environment With Hardware Accelerators</title><title>IEEE access</title><addtitle>Access</addtitle><description>The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.</description><subject>Accelerators</subject><subject>Algorithms</subject><subject>Applications programs</subject><subject>Computer architecture</subject><subject>Curves</subject><subject>Ed25519</subject><subject>Generators</subject><subject>Hardware</subject><subject>Microprocessors</subject><subject>Registers</subject><subject>RISC</subject><subject>RISC-V</subject><subject>Security</subject><subject>SHA-3</subject><subject>Software</subject><subject>Software algorithms</subject><subject>TEE</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkNtKw0AQhoMoKLVP4E3A69Q9ZQ-XNUQtCCKteLmsu7OaWrO62Xh4e1NTinMzwzD_PzNflp1hNMMYqYt5VdXL5YwggmZEScGxOMhOCOaqoCXlh__q42zadWs0hBxapTjJru77xr7mlyGkPPh8Ffsugcvrb7B9akKb1-1nE0P7Bm3KH5v0kt-Y6L5MhHxuLWwgmhRid5odebPpYLrLk-zhql5VN8Xt3fWimt8WliGZClViT5QS0tFSYCIIxUJaThTGnClOqVTIGvAUlJKWOuakR1QwJp68Vbikk2wx-rpg1vo9Nm8m_uhgGv3XCPFZm5gauwEtnHMlMZ6JEjFDzRMYcAwh6jm1RPLB63z0eo_ho4cu6XXoYzucrwkrGVJkQDpM0XHKxtB1Efx-K0Z6y1-P_PWWv97xH1Rno6oBgL1CIc6Gn-kvKEx_AA</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Hoang, Trong-Thuc</creator><creator>Duran, Ckristian</creator><creator>Nguyen-Hoang, Duc-Thinh</creator><creator>Le, Duc-Hung</creator><creator>Tsukamoto, Akira</creator><creator>Suzaki, Kuniyasu</creator><creator>Pham, Cong-Kha</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-4078-0836</orcidid></search><sort><creationdate>2020</creationdate><title>Quick Boot of Trusted Execution Environment With Hardware Accelerators</title><author>Hoang, Trong-Thuc ; Duran, Ckristian ; Nguyen-Hoang, Duc-Thinh ; Le, Duc-Hung ; Tsukamoto, Akira ; Suzaki, Kuniyasu ; Pham, Cong-Kha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-951f29978d35712723178c62911649633890caef3e998c3d4d8f037447bfc9153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Accelerators</topic><topic>Algorithms</topic><topic>Applications programs</topic><topic>Computer architecture</topic><topic>Curves</topic><topic>Ed25519</topic><topic>Generators</topic><topic>Hardware</topic><topic>Microprocessors</topic><topic>Registers</topic><topic>RISC</topic><topic>RISC-V</topic><topic>Security</topic><topic>SHA-3</topic><topic>Software</topic><topic>Software algorithms</topic><topic>TEE</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hoang, Trong-Thuc</creatorcontrib><creatorcontrib>Duran, Ckristian</creatorcontrib><creatorcontrib>Nguyen-Hoang, Duc-Thinh</creatorcontrib><creatorcontrib>Le, Duc-Hung</creatorcontrib><creatorcontrib>Tsukamoto, Akira</creatorcontrib><creatorcontrib>Suzaki, Kuniyasu</creatorcontrib><creatorcontrib>Pham, Cong-Kha</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hoang, Trong-Thuc</au><au>Duran, Ckristian</au><au>Nguyen-Hoang, Duc-Thinh</au><au>Le, Duc-Hung</au><au>Tsukamoto, Akira</au><au>Suzaki, Kuniyasu</au><au>Pham, Cong-Kha</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Quick Boot of Trusted Execution Environment With Hardware Accelerators</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2020</date><risdate>2020</risdate><volume>8</volume><spage>74015</spage><epage>74023</epage><pages>74015-74023</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode. The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure. Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations. In this paper, a RISC-V system compatible with TEEs featuring security algorithm accelerators is presented. The hardware accelerators are the SHA-3 hash and the Ed25519 elliptic curve algorithms. TileLink is used for the communications between the processor and the register of the accelerators. For the TEE boot, the software procedures are switched with the accelerated counterpart. Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data. The Ed25519 performs 90% better compared to the software counterpart in execution times.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2020.2987617</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-4078-0836</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2020, Vol.8, p.74015-74023 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_9064723 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Accelerators Algorithms Applications programs Computer architecture Curves Ed25519 Generators Hardware Microprocessors Registers RISC RISC-V Security SHA-3 Software Software algorithms TEE |
title | Quick Boot of Trusted Execution Environment With Hardware Accelerators |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T16%3A24%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Quick%20Boot%20of%20Trusted%20Execution%20Environment%20With%20Hardware%20Accelerators&rft.jtitle=IEEE%20access&rft.au=Hoang,%20Trong-Thuc&rft.date=2020&rft.volume=8&rft.spage=74015&rft.epage=74023&rft.pages=74015-74023&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2020.2987617&rft_dat=%3Cproquest_ieee_%3E2454092202%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2454092202&rft_id=info:pmid/&rft_ieee_id=9064723&rft_doaj_id=oai_doaj_org_article_7ddd52af47504a3abeaed4003f63c286&rfr_iscdi=true |