The 4-year grant has been awarded to a collaborative research team led by and his colleagues and in the at the University of Bristol.
Processors, which are the core components of modern computing devices, have become the centre of cryptographers’ attention due to a new class of cryptanalytic attacks. These attacks aim to extract secret information by observing physical characteristics, e.g. the power consumption, of the processor. Whilst much is known about how to conduct these attacks, much less is known about how to efficiently design processors resilient to these attacks.
Professor Nishan Canagarajah, Head of the Department of Computer Science, said: “This grant will enable us to build on our existing strengths and work towards establishing Bristol as a world class centre for research in secure processor architectures.â€
Together with international industrial partners such as Cryptography Research Inc. (US inventor of Differential Power Analysis) and national companies such as XMOS (Bristol based semi-conductor company) and SiVenture (Maidenhead based fully accredited security testing lab) the Bristol team aims to transform the current approaches to building secure processors.
Contemporary approaches to secure processor designs either replace the underlying silicon structures, this leads to a dramatic increase in production cost per unit, or rewrite the cryptographic algorithms, this requires tailor made software for each different processor type.
The novel approach investigated in this project sits between these two extremes: it alters the micro-architecture of the processor. Consequently, such processors can be built based on conventional silicon structures and they retain the same functional characteristics as standard processors. However, their leakage characteristics are altered to prevent a large number of physical attacks.