Cryptography & Network-Security: Implementations in Hardware



Similar documents
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Hardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner

7a. System-on-chip design and prototyping platforms

Cryptographic Rights Management of FPGA Intellectual Property Cores

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

ECE 545. Digital System Design with VHDL

Cryptanalysis with a cost-optimized FPGA cluster

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

CISCO PIX SECURITY APPLIANCE LICENSING

7! Cryptographic Techniques! A Brief Introduction

IJESRT. [Padama, 2(5): May, 2013] ISSN:

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Thanks, But No Thanks

CS 758: Cryptography / Network Security

FPGA-based MapReduce Framework for Machine Learning

Networking Virtualization Using FPGAs

Horst Görtz Institute for IT-Security

Custom design services

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Implementation of Full -Parallelism AES Encryption and Decryption

Accelerating Microsoft Exchange Servers with I/O Caching

Ashraf Abusharekh Kris Gaj Department of Electrical & Computer Engineering George Mason University

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

CRYPTOGRAPHY IN NETWORK SECURITY

Implementation and Design of AES S-Box on FPGA

Hardware-Software Codesign in Embedded Asymmetric Cryptography Application a Case Study

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

An Introduction to Cryptography as Applied to the Smart Grid

Preventing Piracy and Reverse Engineering of SRAM FPGAs Bitstream

Offline HW/SW Authentication for Reconfigurable Platforms

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Evaluating The Performance of Symmetric Encryption Algorithms

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

Lecture 9: Application of Cryptography

Seeking Opportunities for Hardware Acceleration in Big Data Analytics

All Programmable Logic. Hans-Joachim Gelke Institute of Embedded Systems. Zürcher Fachhochschule

High-Speed Computing & Co-Processing with FPGAs

Computer Security: Principles and Practice

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Chapter 8. Network Security

Cryptography & Digital Signatures

How To Understand And Understand The History Of Cryptography

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Complying with PCI Data Security

IT Networks & Security CERT Luncheon Series: Cryptography

White Paper FPGA Performance Benchmarking Methodology

Network Security Technology Network Management

Haswell Cryptographic Performance

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

FPGA Design From Scratch It all started more than 40 years ago

Safety and security related features in AUTOSAR

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

Secured Embedded Many-Core Accelerator for Big Data Processing

9/14/ :38

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

Enova X-Wall LX Frequently Asked Questions

IronKey Data Encryption Methods

CRYPTOGRAPHY AND NETWORK SECURITY

Cyber Security Practical considerations for implementing IEC 62351

Rapid System Prototyping with FPGAs

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

Table of Contents. Bibliografische Informationen digitalisiert durch

Qsys and IP Core Integration

Riverbed Stingray Traffic Manager VA Performance on vsphere 4 WHITE PAPER

Secure Network Communications FIPS Non Proprietary Security Policy

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

Computer System Management: Hosting Servers, Miscellaneous

FPGA and ASIC Implementation of Rho and P-1 Methods of Factoring. Master s Thesis Presentation Ramakrishna Bachimanchi Director: Dr.

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

International Workshop on Field Programmable Logic and Applications, FPL '99

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

FPGA Music Project. Matthew R. Guthaus. Department of Computer Engineering, University of California Santa Cruz

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

SECURITY IN NETWORKS

Salsa20/8 and Salsa20/12

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

Paolo Maistri. September 8, Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

PC Business Banking. Technical Requirements

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

FPGA IMPLEMENTATION OF AES ALGORITHM

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)

Lukasz Pater CMMS Administrator and Developer

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method

FPGA-based Multithreading for In-Memory Hash Joins

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

The Advanced Encryption Standard: Four Years On

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

Transcription:

Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm

6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu Bajracharya Nghi Nguyen Deapesh Misra

Paul Kohlbrenner 22 conference papers 7 defended MS Theses 4 MS Theses in progress Tim Grembowski Roar Lien Ashraf AbuSharekh

Life of encryption standards American standards 1980 1990 2000 2010 2020 2030 1977 1999 2001 DES 56 bit key Triple DES AES-contest 1998 112, 168 bit keys AES 128, 192, and 256 bit keys DES 56 bit key AES min. 128 bit key 2 72 10 22 more keys to try

Deep Crack DES Breaker Electronic Frontier Foundation, 1998 Total cost: $220,000 Average time of search: 4.5 days/key 1800 ASIC chips

First Project at GMU: Advanced Encryption Standard (AES) Contest June 1998 15 Candidates from USA, Canada, Belgium, France, Germany, Norway, UK, Isreal, Korea, Japan, Australia, Costa Rica August 1999 5 final candidates Mars, RC6, Rijndael, Serpent, Twofish Round 1 Security Software efficiency Round 2 Security Hardware efficiency October 2000 1 winner: Rijndael Belgium

Two primary ways of implementing cryptography in hardware ASIC Application Specific Integrated Circuit designed all the way from behavioral description to physical layout designs must be sent for expensive and time consuming fabrication in semiconductor foundry FPGA Field Programmable Gate Array no physical layout design; design ends with a bitstream used to configure a device bought off the shelf and reconfigured by designers themselves

FPGA components Configurable Logic Blocks Block RAMs Block RAMs I/O Blocks Block RAMs Major vendors: Xilinx, Inc. and Altera Corp.

Implementations of AES candidates using Xilinx FPGA, Virtex 1000 Speed [Mbit/s] 500 431 450 400 350 300 250 200 150 100 50 0 Serpent I8 444 414 353 294 177 173 Our results University of Southern California Worcester Polytechnic Institute 104 149 Rijndael Twofish Serpent RC6 Mars I1 62 143 112 88 61 102

Survey filled by 167 participants of the Third AES Conference, AES3, April 2000 # votes 100 90 80 70 60 50 40 30 20 10 0 Rijndael Serpent Twofish RC6 Mars

Speed of the final AES candidates in hardware Speed [Mbit/s] 500 450 400 350 300 250 200 150 100 50 0 K.Gaj, P. Chodowiec, AES3, April, 2000 Serpent Rijndael Twofish RC6 Mars

Outcome of our research Software Efficiency Security Flexibility Hardware Efficiency Demonstrated the importance of hardware efficiency in the evaluation of cryptographic algorithms Influenced the choice of a new standard to be used worldwide for the next 50-60 years

GMU Hardware Cryptographic Cores developed together with the graduate students: Pawel Chodowiec, Roar Lien, and Tim Grembowski, 1999-2003 commercialized by the GMU Office of Intellectual Property and Technology Transfer led by Jennifer Murphy Encryption AES Triple DES Twofish Serpent RC6 Mars Hash Functions SHA-1 SHA-512

1 Gbit/s Reconfigurable Hardware Accelerator for Virtual Private Networks, 2001-2002 Host".!.!.!.! Security gateway Internet" Security gateway Host".!.!.!.! Host" Cryptographic accelerators Host" in collaboration with the University of Southern California - Information Sciences Institute (USC ISI), Arlington, VA sponsored by DARPA

FPGA Accelerator Board - SLAAC-1V developed under DARPA-funded project Systems-Level Applications of Adaptive Computing (SLAAC)

Reconfigurable Computers from SRC Computers, Inc. and Star Bridge Systems, Inc. SRC-6E Star Bridge HC-36

Reconfigurable Computers Basic Architecture µp Board µp Board Xeon µp Xeon µp FPGA Processor Board Xeon µp Xeon µp L2 L2 MAP Board L2 L2 MIOC Control Chip (6x) Control Chip (6x) MIOC PCI Slot Private Memory S N A P On-Board Memory (24 MB) On-Board Memory (24 MB) S N A P Private Memory PCI Slot (6x) (6x) User Chip User Chip User Chip User Chip 4 x Xilinx Virtex II 6000

NSA-sponsored project Libraries for reconfigurable computers, 2002- SRC Computers Star Bridge Systems Tarek El-Ghazawi, GWU, Washington, DC Duncan Buell, USC Columbia, SC Douglas Fouts, NPS Monterey, CA

Benchmarks for the SRC Reconfigurable Computer 1000+ speed-up vs. Pentium 4 for Elliptic Curve Cryptography & Secret-Key Cipher Breaking

Next big project: Factoring of large numbers = evaluating security of the RSA public key cryptosystem Given N = P Q find separately P and Q High Potential GRAs sponsored by the GMU Provost Office Sashisu Bajracharya Deapesh Misra

Public Key Cryptosystems Public key of Bob - K B Private key of Bob - k The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then B insert it again. Network Alice Encryption Decryption Bob

Keys in the RSA public key cryptosystem PUBLIC KEY PRIVATE KEY { e, N } { d, P, Q } N = P Q P, Q - large prime numbers e d 1 mod ((P-1)(Q-1))

FPGA & Crypto: Is Marriage in the Cards?

Cryptographic architectures embedded in reconfigurable devices workshop - CryptArchi 2004 Abbey La Bussiére near Dijon, France June 16 18th 2004 Viktor Fischer Université de Saint-Etienne France Local organization Kris Gaj George Mason University USA Program Chair

Field Trips CHES 2002, San Francisco Macquarie University, Sydney, Australia, 2002 ISC 2002, Rio de Janeiro, Brazil FPT 2003, Tokyo, Japan, 2003

Looking forward to the next 20 years in the ECE Department at GMU!