Cryptology ePrint Archive: Report 2016/204
A Memory Encryption Engine Suitable for General Purpose Processors
Abstract: Cryptographic protection of memory is an essential ingredient for any technology that allows a closed computing system to run software in a trustworthy manner and handle secrets, while its external memory is susceptible to eavesdropping and tampering. An example for such a technology is
Intel's emerging Software Guard Extensions technology (Intel SGX) that appears in the latest processor generation, Architecture Codename Skylake.
This technology operates under the assumption that the security perimeter includes only the internals of the CPU package, and in particular, leaves the DRAM untrusted.
It is supported by an autonomous hardware unit called the Memory Encryption Engine (MEE), whose role is to protect the confidentiality, integrity, and freshness of the CPU-DRAM traffic over some memory range.
To succeed in adding this unit to the micro architecture of a general purpose processor product, it must be designed under very strict engineering constraints. This requires a careful combination of cryptographic primitives operating over a customized integrity tree that mostly resides on the DRAM while relying only on a small internally stored root.
The purpose of this paper is to explain how this hardware component of SGX works, and the rationale behind some of its design choices.
To this end, we formalize the MEE threat model and security objectives, describe the MEE design, cryptographic properties, security margins, and report some concrete performance results.
Category / Keywords: implementation /
Date: received 25 Feb 2016, last revised 25 Feb 2016
Contact author: shay at math haifa ac il
Available format(s): PDF | BibTeX Citation
Version: 20160225:211316 (All versions of this report)
Short URL: ia.cr/2016/204
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]