Skip to main navigation Skip to search Skip to main content

Jasmin: High-assurance and high-speed cryptography

  • José Bacelar Almeida
  • , Manuel Barbosa
  • , Gilles Barthe
  • , Arthur Blot
  • , Benjamin Grégoire
  • , Vincent Laporte
  • , Tiago Oliveira
  • , Hugo Pacheco
  • , Benedikt Schmidt
  • , Pierre Yves Strub

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Jasmin is a framework for developing high-speed and high-assurance cryptographic software. The framework is structured around the Jasmin programming language and its compiler. The language is designed for enhancing portability of programs and for simplifying verification tasks. The compiler is designed to achieve predictability and efficiency of the output code (currently limited to x64 platforms), and is formally verified in the Coq proof assistant. Using the supercop framework, we evaluate the Jasmin compiler on representative cryptographic routines and conclude that the code generated by the compiler is as efficient as fast, hand-crafted, implementations. Moreover, the framework includes highly automated tools for proving memory safety and constant-time security (for protecting against cache-based timing attacks). We also demonstrate the effectiveness of the verification tools on a large set of cryptographic routines.

Original languageEnglish
Title of host publicationCCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1807-1823
Number of pages17
ISBN (Electronic)9781450349468
DOIs
Publication statusPublished - 30 Oct 2017
Event24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 - Dallas, United States
Duration: 30 Oct 20173 Nov 2017

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017
Country/TerritoryUnited States
CityDallas
Period30/10/173/11/17

Keywords

  • Constanttime security
  • Cryptographic Implementations
  • Safety
  • Verified Compiler

Fingerprint

Dive into the research topics of 'Jasmin: High-assurance and high-speed cryptography'. Together they form a unique fingerprint.

Cite this