The prototype runs encrypted machine code on encrypted data in registers and memory and on buses. The aim is to protect user data against the operator, and so-called `Iago' attacks in general, for those computing paradigms that entail trust in data-oriented computation in remote locations, overseen by untrusted operators, or embedded unattended.
The architecture is 32-bit OpenRISC, admitting any block cipher compatible with the physical word size chosen for implementation. We are reporting performance from cycle-accurate behavioural simulations of the design running AES-128 (symmetric, keyed; the US Advanced Encryption Standard) and Paillier-72 (asymmetric, additively homomorphic, no key in-processor) encryptions in a 128-bit word, and RC2-64 encryption (symmetric, keyed) in a 64-bit word.Category / Keywords: applications / Encrypted Computation, Computer Architecture Date: received 31 Dec 2016, last revised 11 Mar 2017 Contact author: Peter T Breuer at gmail com Available format(s): PDF | BibTeX Citation Note: Update for resubmission. Version: 20170311:074646 (All versions of this report) Short URL: ia.cr/2016/1193 Discussion forum: Show discussion | Start new discussion