Cryptanalysis with a cost-optimized FPGA cluster



Similar documents
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Table of Contents. Bibliografische Informationen digitalisiert durch

Password Cracking in the Cloud

Cryptography & Network-Security: Implementations in Hardware

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cyber Security Practical considerations for implementing IEC 62351

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Cryptography and Network Security

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method

Seeking Opportunities for Hardware Acceleration in Big Data Analytics

High-Performance Modular Multiplication on the Cell Processor

Horst Görtz Institute for IT-Security

Generic attacks and index calculus. D. J. Bernstein University of Illinois at Chicago

Key & Data Storage on Mobile Devices

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Computer Security: Principles and Practice

Lightweight Cryptography From an Engineers Perspective

Elements of Applied Cryptography Public key encryption

CRYPTOGRAPHY IN NETWORK SECURITY

Offline HW/SW Authentication for Reconfigurable Platforms

Hardware and Software

Von der Hardware zur Software in FPGAs mit Embedded Prozessoren. Alexander Hahn Senior Field Application Engineer Lattice Semiconductor

CSCE 465 Computer & Network Security

FPGAs for Trusted Cloud Computing

Introduction to Digital System Design

7a. System-on-chip design and prototyping platforms

Open Flow Controller and Switch Datasheet

Lab 7. Answer. Figure 1

All Programmable Logic. Hans-Joachim Gelke Institute of Embedded Systems. Zürcher Fachhochschule

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Authentication requirement Authentication function MAC Hash function Security of

White Paper. Enhancing Website Security with Algorithm Agility

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

IT Networks & Security CERT Luncheon Series: Cryptography

Architectures and Platforms

Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

MEng, BSc Computer Science with Artificial Intelligence

WIBU-SYSTEMS CodeMeter a Revolutionary Digital Rights Management System

HARDWARE ACCELERATION IN FINANCIAL MARKETS. A step change in speed

IJESRT. [Padama, 2(5): May, 2013] ISSN:

Information and Communications Technology Courses at a Glance

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Thanks, But No Thanks

High-Speed Computing & Co-Processing with FPGAs

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Pervasive Computing und. Informationssicherheit

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

Ahsay Online Backup. Whitepaper Data Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

An Introduction to Cryptography as Applied to the Smart Grid

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

FPGA IMPLEMENTATION OF AES ALGORITHM

AppliedMicro Trusted Management Module

National Security Agency Perspective on Key Management

International Journal of Advancements in Research & Technology, Volume 2, Issue3, March ISSN

IoT Security Concerns and Renesas Synergy Solutions

Secure Network Communications FIPS Non Proprietary Security Policy

Is Your SSL Website and Mobile App Really Secure?

Data Superhero Online Backup Whitepaper Data Security

9/14/ :38

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

The Central Processing Unit:

MEng, BSc Applied Computer Science

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

high-performance computing so you can move your enterprise forward

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

A Standards-based Approach to IP Protection for HDLs

Message Authentication

CRYPTOGRAPHY AS A SERVICE

Figure 1 FPGA Growth and Usage Trends

Avoiding pitfalls in PROFINET RT and IRT Node Implementation

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Cryptography & Digital Signatures

UM0586 User manual. STM32 Cryptographic Library. Introduction

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

Technical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview

Implementation of Full -Parallelism AES Encryption and Decryption

Secure Cloud Storage and Computing Using Reconfigurable Hardware

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Guidance Regarding Skype and Other P2P VoIP Solutions

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

RC6. Marcel Felipe Weschenfelder

Transcription:

Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV Special Purpose Hardware for Cryptography: Attacks and Applications December 4 8, 2006

Cryptanalysis with cost-optimized FPGA clusters Acknowledgements Special thanks to Tim Güneysu, Christof Paar, Christian Schleiffer (Horst Görtz Institute, University of Bochum) Gerd Pfeiffer, Manfred Schimmler (University of Kiel, hardware layout) Jean-Jacques Quisquater, François-Xavier Standaert (Universitè Catholique de Louvain, DES-core) Xilinx (generous donations of Spartan3 devices)

Cryptanalysis with cost-optimized FPGA clusters Agenda Security vs. Cost Design of the COPACOBANA FPGA Cluster Application 1: DES Brute-Force Application 2: Attack on ECC Conclusion and Outlook

Cryptanalysis with cost-optimized FPGA clusters When is a Cipher Secure? Symmetric crypto (hopefully) only brute-force attack possible secure key lengths : 112 256 bits (attack compl. 2 112 2 256 ) but in practice wide variety of keys: AES, DES, RC4, A5, attack complexities: 2 56 2 256 security of hash functions (MD5, SHA-1, )? Asymmetric crypto (RSA, ECC, DL) algorithmic attacks (e.g., factorization) dictate larger keys secure key lengths : > 2048 bits (> 160 bits for ECC) key lengths in practice: - RSA, DL: 1024 4096 bits - ECC: 160 256 bits attack complexities: 2 80 (?) 2 128

Cryptanalysis with cost-optimized FPGA clusters Security and Computation Traditional: security of ciphers = complexity of attacks However: what really matters are the costs of an attack State-of-the-art: - < 2 50 steps can be done with PC networks (more or less conveniently) - > 2 80 steps are very hard with today s technology (probably also for intelligence agencies feasible? infeasible 0 bit 50 bits 80 bits Major question: cost of attack for ciphers with 50 80 bits security? (RSA1024, ECC160, SHA-1, DES, A5, )

Cryptanalysis with cost-optimized FPGA clusters Introduction: Massive Computing Supercomputers (Cray, SG, SRC ) General (= complex & expensive) parallel computing architectures fast I/O, large memory, easy to program poor cost-performance ratio for (most) cryptanalysis Distributed computing (conventional PCs) Dedicated clients in clusters, or Using PC s idle time: E.g., SETI@home (BOINC framework) problem of motivation, confidentiality issues Special-purpose hardware ASIC - Application Specific Integrated Circuits (high NRE) FPGA - Field Programmable Gate Arrays (low NRE) best cost-performance ratio

Cryptanalysis with cost-optimized FPGA clusters Introduction: Advantage of Hardware Cost-performance ratio of DES 1) : PC vs. FPGA DES encryptions / decryptions per second Pentium4@3GHz: 2 10 6 price per device (retail): 80 Xilinx XC3S1000@100MHz 400 10 6 price per device (retail): 40 Cost-performance ratio differs by 2-3 orders of magnitude! Based on actual implementations is software and hardware

Cryptanalysis with cost-optimized FPGA clusters Agenda Security vs. Cost Design of the COPACOBANA FPGA Cluster Application 1: DES Brute-Force Application 2: Attack on ECC Conclusion and Outlook

Cryptanalysis with cost-optimized FPGA clusters What s in a name? Copacobana Copacabana

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: Design Principles Ability to perform 2 56 crypto operations Re-programmable: applicable to many ciphers (other apps.?) Strictly optimized cost-performance ratio: - off-the-shelf hardware (low-cost) - many logic resources (performance) Modular design < 10,000 (including fabrication and material cost) Parallel architecture, based on 120 low-cost FPGAs Sacrifices - no global memory - no high-speed communication ( only Mbit/s)

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: Basic Design Modular design: 1. Backplane 2. FPGA modules (each with 6 low-cost FPGAs) 3. Controller card with USB/ Ethernet interface Easily extendable: Up to 20 FPGA modules with 6 FPGAs each Connect multiple COPACOBANAs via USB/ Ethernet

COPACOBANA: Alpha Prototype Cryptanalysis with cost-optimized FPGA clusters 1

COPACOBANA: Beta Version Cryptanalysis with cost-optimized FPGA clusters 1

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: What s inside? Controller board FPGA modules Backplane Power supply Big cables Scales easily: 20 FPGA modules/machine (120 FPGAs/ machine) multiple machines via USB/ Ethernet

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: FPGA Modules 6x Spartan 3 FPGA (xc3s1000, FT256 packaging) Standard DIMM module Connection to backplane (64-bit data bus)

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: FPGA Modules Functionality: 6x Spartan-3 FPGAs (xc3s1000) per module BGA packaging (FT256) Internal clock rate up to 300 MHz Addressing: HW decoded adress of FPGA modules (GAL on backplane) HW decoded adress of single FPGA Further addresses (5-bit) for FPGA-internal processing 64-bit data connection to backplane (bi-directional) 64-bit local bus (per module) Host cryptanalytical applications, e.g., Key search engines for DES ECM engines Pollard Rho engines

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: Controller Module Proprietary board (Cesys USB2FPGA w/ Spartan II)

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: Controller Module Functionality: Programming of FPGAs: Individual (download per FPGA) Concurrent (download to all/ subset FPGAs) Communication with FPGAs: Initialization of FPGA logic Polling of FPGAs Communication with host-pc: Redirecting results Simple pre- and post processing New controller being developed (Ethernet, MicroBlaze, )

Cryptanalysis with cost-optimized FPGA clusters 1 COPACOBANA: Applications First flexible cryptanalytical machine outside government agencies 1. Exhaustive key search of DES ciphers with 2 56 2 64 attack steps possible Attacks feasible 2. Real-world systems such as epass, Norton Diskreet, CSA 3. Elliptic Curve Discrete Logarithm Problem (ECDLP) Parallelized Pollard s Rho 4. Factorization Improves other attacks Parallelized Elliptic Curve Method (ECM) as subroutine for GNFS (see GMU s talk later) Robust security estimations

Cryptanalysis with cost-optimized FPGA clusters 2 Agenda Security vs. Cost Design of the COPACOBANA FPGA Cluster Application 1: DES Brute-Force Application 2: Attack on ECC Conclusion and Outlook

Cryptanalytical Applications: Attacks on DES Cryptanalysis with cost-optimized FPGA clusters 2 Data Encryption Standard (DES): Block cipher with 56-bit key Expired standard, but still used (legacy products, epass, Norton Diskreet, ) Exhaustive key search (conventional technology): Check 2 55 keys on average PC (e.g., Pentium4@3GHz) 2 mio. keys/sec Average key search with one PC 2 34 sec = 545 years! Can do much better with special-purpose hardware!

Cryptanalysis with cost-optimized FPGA clusters 2 Attacks on DES FPGA-based attacks on the Data Encryption Standard (DES): Exhaustive key search (FPGA based): 4 completely pipelined DES engines per FPGA (courtesy of the crypto group of UCL) one key per clock cycle per DES engine One FPGA@100MHz: 400 mio. keys/ sec xc3s1000

Cryptanalysis with cost-optimized FPGA clusters 2 Attacks on DES COPACOBANA: average key search of 8.7 days @ 100 MHz Somewhat higher clock rates possible FPGA vs. PC (average key search in 8.7 days) - 22,865 Pentium 4 ( 3.6 million incl. overhead) or - COPACOBANA (total cost 9000 incl. overhead)

Cryptanalysis with cost-optimized FPGA clusters 2 Attacks on DES Host-PC application (console output):

A Historical Perspective: The Power of Moore s Law Cryptanalysis with cost-optimized FPGA clusters 2 Breaking DES in days: DeepCrack, 1998 $250,000 COPACOBANA, 2006 $10,000 Moore Law: 50% cost reduction / 1.5 years 2006-1998 = 8 years 5 x 1.5 years Prediction: $250,000 / 2 5 $8,000 (close to actual $10,000)

Cryptanalysis with cost-optimized FPGA clusters 2 Agenda Security vs. Cost Design of the COPACOBANA FPGA Cluster Application 1: DES Brute-Force Application 2: Attack on ECC Conclusion and Outlook

Cryptanalysis with cost-optimized FPGA clusters 2 ECDL Problem Many real-world applications rely on hardness of ECDLP - ECDSA, - ECDH, - Let P be a generator. Determine discrete logarithm l of a point Q such that Q = l P. P Q = l P

Cryptanalysis with cost-optimized FPGA clusters 2 Generic ECDLP Attacks If parameters are chosen with care, only generic attacks are possible 1. Naϊve Search: Sequentially test P, 2P, 3P, 4P, Brute force attack is infeasible if #E 2 80 2. Shank s Baby-Step-Giant-Step Method Complexity in time AND memory of about #E 3. Pollard s Rho method (ρ) Most efficient algorithm for general ECDLP Complexity of #E Note: All attacks are exponential in the bit length of the group order

Cryptanalysis with cost-optimized FPGA clusters 2 Multi Processor Pollard Rho (MPPR) X 5 X 4 X 3 DP V 5 V 4 V 3 DP DP W 5 = U 5 W 4 = U 4 W 3 = U 3 Best known attack against general ECC Proposed by van Oorschot/Wiener in 1999 Processors have individual search paths for Distinguished Points (DP) X 2 V 2 DP U 2 DP W 2 DP are stored at central server Duplicate DP = ECDLP solution X 1 X 0 DP V 1 V 0 U 0 U 1 DP W 1 W 0 Parallelization idea: speed up linear in number of employed processors Processor w 1 Processor w 2 Processor w 3 Processor w 4 Colliding DP trails of multiple processors w i

Cryptanalysis with cost-optimized FPGA clusters 3 Hardware Implementation (Top Layer) Central Server Neither fastest, nor smallest implementations is needed, but Time-Area Optimum. I/O Communication Controller PRCore 1 Processor Controller PRCore 2... PRCore k Top Level Design Distinguished Point Buffer FPGA Each FPGA: multiple point engines (PRCore) each computing a separate trail. All cores store distinguished points in a shared point buffer. Buffer locking & host communication are needed to transfer DPs to the server. FPGA to Host communication via serial (for debugging) or proprietary bus interface.

ECDLP Attack Comparison: SW vs. HW for $10.000 Cryptanalysis with cost-optimized FPGA clusters 3 million 900 800 Points per Second 700 600 500 400 300 200 100 0 64 80 96 128 Bit size k 160 SW Performance of 25 Pentium M@1.7GHz HW Performance of 1 COPACOBANA (120 FPGA XC3S1000)

ECDLP Attacks for US$ 1 million Bit size k PC Cluster COPACOBANA (estimate) ASIC (estimate) 80 40.6 h 2.58 h - 96 8.04 d 14.8 h - 112 (SEC-1)* 6.48 y 262 d 1.29 d 128 1.94 x10 3 y 213 y 1.03 y 160 1.51 x 10 8 y 2.58 x 10 7 y 1.24 x 10 5 y * SECG (STANDARDS FOR EFFICIENT CRYPTOGRAPHY) Cryptanalysis with cost-optimized FPGA clusters 3

Cryptanalysis with cost-optimized FPGA clusters 3 Agenda Security vs. Cost Design of the COPACOBANA FPGA Cluster Application 1: DES Brute-Force Application 2: Attack on ECC Conclusion and Outlook

Cryptanalysis with cost-optimized FPGA clusters 3 Conclusion COPACOBANA Results - DES in 8.6 days (possibly 50% speedup in near future) - ECC-p163 attack currently $ 1 trillion ($10 12 ) - Moore s Law: ECC 160 will stay secure for 20 years - ECC-112 (SEC-1 standard): insecure! - possibly real-time attack against epass Many marginally weak ciphers are breakable Strong ciphers (AES, RSA-1024, ECC-163, ) not breakable, but robust estimates by extrapolation of COPACOBANA results Several future applications are currently investigated Pictures, papers, and much more at www.copacobana.org We are looking for partners for other applications

Cryptanalysis with cost-optimized FPGA clusters 3 Outlook Future work includes Optimization of the COPACOBANA platform: - harden communication framework (almost done) - analyze SECG 80, 112, 128 - implement parallel ECM for COPACOBANA Optimization of VHDL implementations Optimization of hardware platform (beyond prototype) Hardware based attacks demand for re-evaluation of security of, e.g., ECC Further applications: Smith-Waterman algorithm for scanning DNA sequences against databases

Questions? Cryptanalysis with cost-optimized FPGA clusters 3