The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform

07/13/2020
by   Rourab paul, et al.
0

The growing sophistication of cyber attacks, vulnerabilities in high computing systems and increasing dependency on cryptography to protect our digital data make it more important to keep secret keys safe and secure. Few major issues on secret keys like incorrect use of keys, inappropriate storage of keys, inadequate protection of keys, insecure movement of keys, lack of audit logging, insider threats and non-destruction of keys can compromise the whole security system dangerously. In this article, we have proposed and implemented an isolated secret key memory which can log life cycle of secret keys cryptographically using blockchain (BC) technology. We have also implemented a special custom bus interconnect which receives custom crypto instruction from Processing Element (PE). During the execution of crypto instructions, the architecture assures that secret key will never come in the processor area and the movement of secret keys to various crypto core is recorded cryptographically after the proper authentication process controlled by proposed hardware based BC. To the best of our knowledge, this is the first work which uses blockchain based solution to address the issues of the life cycle of the secret keys in hardware platform. The additional cost of resource usage and timing complexity we spent to implement the proposed idea is very nominal. We have used Xilinx Vivado EDA tool and Artix 7 FPGA board.

READ FULL TEXT

page 1

page 2

page 3

page 4

07/09/2019

Private key encryption and recovery in blockchain

The disruptive technology of blockchain can deliver secure solutions wit...
06/29/2021

Mission Impossible: Securing Master Keys

Securing a secret master key is a non-trivial task, we even argue it is ...
04/04/2018

Controllable Identifier Measurements for Private Authentication with Secret Keys

The problem of secret-key based authentication under a privacy constrain...
02/01/2018

Attacking the Nintendo 3DS Boot ROMs

We demonstrate attacks on the boot ROMs of the Nintendo 3DS in order to ...
06/29/2022

Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

We propose a biometric identification system where the chosen- and gener...
09/14/2019

PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE)

This article presents the first-ever blockchain which can simultaneously...
05/30/2018

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

Modern applications are increasingly advanced and complex, and inevitabl...