Current data protection technologies such as those based on public‐key encryption and broadcast encryption focus on the secure control and protection of data. Although these protection schemes are effective and mathematically sound, they are susceptible to systematic attacks that utilize any underlying platform weakness, bypassing the cryptographic strengths of the actual schemes. Thus, ensuring that the computing platform supports the cryptographic data protection layers is a critical issue. The Cell Broadband Engine™ (Cell/B.E.) processor security architecture has three core features that are well suited for this purpose. It provides hardware‐enforced process isolation in which code and data can execute in physically isolated memory space. It also provides the ability to perform hardware‐supported authentication of...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty