Bennet Yee

Using Secure Coprocessors Degree Type: Ph.D. in Computer Science
Advisor(s): Doug Tygar
Graduated: May 1994

Abstract:

How do we build distributed systems that are secure? Cryptographic techniques can be used to secure the communications between physically separated systems, but this is not enough: we must be able to guarantee the privacy of the cryptographic keys and the integrity of the cryptographic functions, in addition to the integrity of the security kernel and access control databases we have on the machines. Physical security is a central assumption
upon which secure distributed systems are built; without this foundation even the best
cryptosystem or the most secure kernel will crumble. In this thesis, I address the distributed
security problem by proposing the addition of a small, physically secure hardware module,
a secure coprocessor, to standard workstations and PCs. My central axiom is that secure
coprocessors are able to maintain the privacy of the data they process.
This thesis attacks the distributed security problem from multiple sides.
First, I analyze the security properties of existing system components, both at the hardware and
software level. Second, I demonstrate how physical security requirements may be isolated to the secure coprocessor, and showed how security properties may be bootstrapped
using cryptographic techniques from this central nucleus of security within a combined hardware/software architecture. Such isolation has practical advantages: the nucleus of security-relevant modules provide additional separation of concern between functional requirements and security requirement, and the security modules are more centralized and
their properties more easily scrutinized. Third, I demonstrate the feasibility of the secure coprocessor approach, and report on my implementation of this combined architecture on top
of prototype hardware. Fourth, I design, analyze, implement, and measure performance of
cryptographic protocols with super-exponential security for zero-knowledge authentication
and key exchange. These protocols are suitable for use in security critical environments.
Last, I show how secure coprocessors may be used in a fault-tolerant manner while still
maintaining their strong privacy guarantees.

Thesis Committee:
Doug Tygar (Chair)
Rick Rashid
M. Satyanarayanan
Steve White (IBM Research)

James Morris, Head, Computer Science Department
Raj Reddy Dean, School of Computer Science

Keywords:
authentication, coprocessor, cryptography, integrity, privacy, security

CMU-CS-94-149.pdf (27.4 MB)
Copyright Notice