Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor
نویسندگان
چکیده
A cryptographic coprocessor is described for certifying outcomes of software programs. The system for certifying and authenticating outputs allows a third party who trusts the secure components of the system to verify that a specified program actually executed and produced a claimed output.
منابع مشابه
Remote auditing of software outputs using a trusted coprocessor
A cryptographic coprocessor is described for certifying outcomes of software programs. The system for certifying and authenticating outputs allows a third party who trusts the secure components of the system to verify that a specified program actually executed and produced a claimed output. keywords.
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملDesigning a CAM-based coprocessor for boosting performance of antivirus software
In this report we investigate the benefits of using a coprocessor coupled with content addrassible memory (CAM) for off-loading of a computation-intensive kernels of antivirus software. Overview of antivirus technologies is presented, followed by performance analysis of real antivirus software to justify the application of coprocessor. High level architecture of the coprocessor and its interact...
متن کاملPrototyping a Lightweight Trust Architecture to Fight Phishing
LTA is a lightweight trust architecture that fights phishing attacks by authenticating e-mail messages. LTA uses separable identity-based ring signatures, which are more attractive than traditional digital signatures for e-mail signing. Because the signatures are identity-based, users do not need to generate keys ahead of time. And because the ring signatures are repudiable, users do not need t...
متن کاملA High Speed KECCAK Coprocessor for Partitioned NSP Architecture on FPGA Platform
The messages in the latest security protocols such as IPSec, TLS and SSL must be handled by highspeed crypto systems. Current computationally extensive cryptographic implementations on di erent platforms such as software, Application Speci c Integrated Circuit (ASIC) and Field Programmable Gate Array (FPGA) without adequate optimization achieve lesser throughput than should be possible. In the ...
متن کامل