The feasibility of memory encryption and authentication

dc.contributor.advisorJohn, Lizy Kurian
dc.creatorOwen, Donald Edward, Jr.en
dc.date.accessioned2013-10-09T20:40:26Zen
dc.date.accessioned2017-05-11T22:34:33Z
dc.date.available2017-05-11T22:34:33Z
dc.date.issued2013-05en
dc.date.submittedMay 2013en
dc.date.updated2013-10-09T20:40:26Zen
dc.descriptiontexten
dc.description.abstractThis thesis presents an analysis of the implementation feasibility of RAM authentication and encryption. Past research as used simulations to establish that it is possible to authenticate and encrypt the contents of RAM with reasonable performance penalties by using clever implementations of tree data structures over the contents of RAM. However, previous work has largely bypassed implementation issues such as power consumption and silicon area required to implement the proposed schemes, leaving implementation details unspecified. This thesis studies the implementation cost of AES-GCM hardware and software solutions for memory authentication and encryption and shows that software solutions are infeasible because they are too costly in terms of performance and power, whereas hardware solutions are more feasible.en
dc.description.departmentElectrical and Computer Engineeringen
dc.format.mimetypeapplication/pdfen
dc.identifier.urihttp://hdl.handle.net/2152/21519en
dc.language.isoen_USen
dc.subjectAESen
dc.subjectGCMen
dc.subjectDRAMen
dc.subjectRAMen
dc.subjectEncryptionen
dc.subjectAuthenticationen
dc.titleThe feasibility of memory encryption and authenticationen

Files