IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
Integrated Cryptographic Facility of the Enterprise Systems Architecture/390: design considerations
IBM Journal of Research and Development
Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using secure coprocessors for privacy preserving collaborative data mining and analysis
DaMoN '06 Proceedings of the 2nd international workshop on Data management on new hardware
Multilevel Design Validation in a Secure Embedded System
IEEE Transactions on Computers
Cryptographic system enhancements for the IBM System z9
IBM Journal of Research and Development
Attested append-only memory: making adversaries stick to their word
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Offline untrusted storage with immediate detection of forking and replay attacks
Proceedings of the 2007 ACM workshop on Scalable trusted computing
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
An Efficient PIR Construction Using Trusted Hardware
ISC '08 Proceedings of the 11th international conference on Information Security
Tiered fault tolerance for long-term integrity
FAST '09 Proccedings of the 7th conference on File and storage technologies
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
IBM Journal of Research and Development
Small, stupid, and scalable: secure computing with faerieplay
Proceedings of the fifth ACM workshop on Scalable trusted computing
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
NetQuery: a knowledge plane for reasoning about network properties
Proceedings of the ACM SIGCOMM 2011 conference
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
A cache design for a security architecture for microprocessors (SAM)
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
Design and implementation of a parallel crypto server
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A new encryption and hashing scheme for the security architecture for microprocessors
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Beyond full disk encryption: protection on security-enhanced commodity processors
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Memory encryption: A survey of existing techniques
ACM Computing Surveys (CSUR)
Hi-index | 0.01 |
IBM has designed special cryptographic processors for its servers for more than 25 years. These began as very simple devices, but over time the requirements have become increasingly complex, and there has been a never-ending demand for increased speed. This paper describes the PCIXCC, the new coprocessor introduced in the IBM z990 server. In many ways, PCIXCC is a watershed design. For the first time, a single product satisfies all requirements across all IBM server platforms. It offers the performance demanded by today's Web servers', it supports the complex and specialized cryptographic functions needed in the banking and finance industry, and it uses packaging technology that leads the world in resistance to physical or electrical attacks against its secure processes and the secret data it holds. Furthermore, it is programmable and highly flexible, so that its function can be easily modified to meet new requirements as they appear. These features are possible because of innovative design in both the hardware and embedded software for the card. This paper provides an overview of that design.