[Cryptech Tech] Working memory on HSM for decrypted private key components?
Pavel Shatov
meisterpaul1 at yandex.ru
Fri Dec 18 10:33:37 UTC 2015
On 16.12.2015 15:42, Joachim Strömbergson wrote:
>>> The whole keywrap mechanism could be implemented in the FPGA which
>>> would mean that keys are only used in the FPGA and not exposed in
>>> cleartext.
>>>
>>> But, at least for RSA keys, the CPU needs to be involved in order
>>> to generate them.
>>
>> Yeah, Pavel and I are both skeptical about implementing Miller-Rabin
>> in Verilog.
>
> You are not alone. The easiest way imho would be to insert a small,
> constrained CPU core and add the alg in SW for it. But that CPU would be
> fairly inefficient and only run in say 100 MHz. (Could be faster
> depending on core used.).
Agree.
>> You'd need an path from the private key generator to the point
>> multiplier.
>
> Yes, which however is not very hard to do. The big consequence with all
> these things is that the FPGA starts moving from a collection of
> co-processor cores that SW can call to something that do things
> independently. We would add some sort of internal controller,
> arbitration (for handling/stalling commands from the CPU when the FPGA
> is using the resources by itself.)
You are right, this will kind of change the paradigm for FPGA from "just
a collection of hardware helper cores, that the main processor can use"
to something more complicated.
--
With best regards,
Pavel Shatov
More information about the Tech
mailing list