Lightweight Cryptography From an Engineers Perspective



Similar documents
ECC is Ready for RFID A Proof in Silicon

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Implementation of Full -Parallelism AES Encryption and Decryption

Triathlon of Lightweight Block Ciphers for the Internet of Things

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

SOPC BASED WIRELESS REMOTE PATIENT MONITORING USING ULTRA LIGHTWEIGHT CRYPTOGRAPHY

Pervasive Computing und. Informationssicherheit

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation

Keywords Web Service, security, DES, cryptography.

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Strengthen RFID Tags Security Using New Data Structure

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

Evaluating The Performance of Symmetric Encryption Algorithms

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

A Study of New Trends in Blowfish Algorithm

PRESENT: An Ultra-Lightweight Block Cipher

The implementation and performance/cost/power analysis of the network security accelerator on SoC applications

Computer Security: Principles and Practice

FPGA IMPLEMENTATION OF AES ALGORITHM

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Fast Implementations of AES on Various Platforms

Table of Contents. Bibliografische Informationen digitalisiert durch

Thanks, But No Thanks

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA

Cryptography and Network Security

Cryptanalysis with a cost-optimized FPGA cluster

Salsa20/8 and Salsa20/12

Implementation and Design of AES S-Box on FPGA

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

Multi-Layered Cryptographic Processor for Network Security

Public Key Cryptography. Performance Comparison and Benchmarking

IJESRT. [Padama, 2(5): May, 2013] ISSN:

The Advanced Encryption Standard: Four Years On

Side Channel Analysis and Embedded Systems Impact and Countermeasures

FPGA IMPLEMENTATION OF AN AES PROCESSOR

Secure and Serverless RFID Authentication and Search Protocols

Reviving smart card analysis

SECURITY IN LOW RESOURCE ENVIRONMENTS

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

Split Based Encryption in Secure File Transfer

Permutation Based Cryptography for IoT

CSCE 465 Computer & Network Security

Fast Software AES Encryption

Key & Data Storage on Mobile Devices

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

NXP & Security Innovation Encryption for ARM MCUs

Cryptography and Network Security Chapter 3

EXAM questions for the course TTM Information Security May Part 1

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

The 128-bit Blockcipher CLEFIA Design Rationale

Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES

Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

Single Sign-On Secure Authentication Password Mechanism

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

Automata Designs for Data Encryption with AES using the Micron Automata Processor

SHA3 WHERE WE VE BEEN WHERE WE RE GOING

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

How To Encrypt With A 64 Bit Block Cipher

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT

An Energy Efficient ATM System Using AES Processor

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Logically Reconfigurable PUFs: Memory-Based Secure Key Storage

How To Understand And Understand The History Of Cryptography

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services

Lightweight Encryption Protocol for Passive RFID System using SIMON

Transcription:

Lightweight Cryptography From an Engineers Perspective ECC 2007

Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2

Outline Motivation Hardware vs. Software Symmetric Lightweight Cryptography Asymmetric Lightweight Cryptography Conclusion 3

What is Lightweight Cryptography? As light as a feather and as hard as dragon scales [Gligor05]: Cryptography tailored to (extremely) constrained devices Not weak crypto Not intended for all-powerful adversaries Not intended to replace traditional cryptography But LWC should influence new algorithms Also dubbed low-cost cryptography (Robshaw) 4

Why Lightweight? past present future Mainframe (n : 1) Personal (1 : 1) Pervasive (1 : n) Pervasive = wireless + embedded + cheap = ASIC = constrained in CPU, memory, battery 5

Standard vs. Lightweight Cryptography Standard vs. Lightweight App. scenario: Throughput: Max. power: Price: Server High High High RFID Low Low (few µw) Low crypto = footwear 6

Metric and Tradeoffs for LWC Resistance against attacks 80 bits 256 bits 1 2 3 48 rounds 16 rounds Area, Throughput, Power serial parallel Energy 7

Why Hardware? 36x 10 faster SW is flexible But pervasive implies: 8 6 4 2 0 High volumes => cheap devices Power/Energy - constraints Example: 160*160 bit multiplication 36x faster 4x smaller Time (sec) Code size (KB) 1.3x smaller Data RAM (KB) Softw are ISE Source: [KP04] 8

Outline Motivation Hardware vs. Software Symmetric Lightweight Cryptography Asymmetric Lightweight Cryptography Conclusion 9

Gate Equivalent NAND 1 Standard Cells UMCL18G212T3 Athlon XP A1 A2 Z 0 0 1 0 1 1 1 0 1 1 1 0 0 HDNAN2D1 9.677 µm² 1 GE Note for Mathematicians: NAND + constants = base 13.24 Mio GE 10

Basic Gates Gate GE NOT 0.5 NOR 1 AND 1.33 OR 1.33 XOR 2.67 2-1-MUX 2.67 GF(2) MUL GF(2) ADD If(sel) 11

S-Boxes in Hardware AES-LUT 1000 AES-CF 300 DES 120 PRESENT 28 LUT are realized as boolean functions Highly non-linear High boolean complexity Big area 8 x 8 6 x 4 4 x 4 12

S-Boxes in Software SW HW 8 x 8 6 x 4 const uint8_t AES_Sbox[256] = {... }; 256 B ROM const uint8_t DES_SBox[64] = { 64 B ROM }; 4 x 4 const uint8_t PRESENT_Sbox[16] = {... 16 B ROM }; 13

PRESENT Permutation Hardware Just wires No delay 0 GE (some wiring) Software for ( PBit = 0, out = 0; PBit<64; PBit++ ) { out = rotate1l_64(out); out = ( ( text >> 63-Pbox[PBit] ) & 1 ); } const uint8_t Pbox[64] = { 0, 4, 8, 12, 16, 20, 24, 28, 32, 36, 40, 44, 48, 52, 56, 60, 1, 5, 9, 13, 17, 21, 25, 29, 33, 37, 41, 45, 49,53, 57, 61, 2, 6, 10, 14, 18, 22, 26, 30, 34, 38, 42, 46,50, 54, 58, 62, 3, 7, 11, 15, 19, 23, 27, 31,35, 39, 43, 47, 51, 55, 59, 63 }; Cumbersome bit operations 64 cycles 64 B ROM 14

Flipflops/Register 6-12 GE per bit Minimum: state (64) + key (80) = 144*6 = 864 GE 29% 55% 3% 11% Storage is very expensive in HW 15

Outline Motivation Hardware vs. Software Symmetric Lightweight Cryptography Asymmetric Lightweight Cryptography Conclusion 16

Evolution of LW Block Ciphers Starting Point AES [FWR05] DES [VHV+88] 3500 3000 3400 3000 2500 2000 1500 1000 500 2309 2168 1570 1200 0 AES DES ser. DES DESXL PRESENT ser. PRESENT 17

Evolution of LW Block Ciphers 1. Step: Serialization Serialized DES [LPP+07] 2. Step: new S-layer DESXL [LPP+07] 3500 3000 3400 3000 2500 2000 1500 1000 500 2309 2168 1570 1200 0 AES DES ser. DES DESXL PRESENT ser. PRESENT 18

Evolution of LW Block Ciphers 3. step: new cipher PRESENT [BKL+07] Next step. Serialized PRESENT 3500 3000 3400 3000 2500 2000 1500 1000 2309 2168 1570 GRAIN 1294 1200 500 0 AES DES ser. DES DESXL PRESENT ser. TRIVIUM PRESENT 2599 19

Outline Motivation Hardware vs. Software Symmetric Lightweight Cryptography Asymmetric Lightweight Cryptography Conclusion 20

ECC Implementations 25000 20000 23000 25000 20000 15000 10000 12944 10113 15000 10000 5000 0 GF(2^191) GF(2^67)^2 GF(2^113) [W04] [BGK+07] [KP06] 5000 0 3400 3000 2309 2168 1570 1200 AES DES ser. DES DESXL PRESENT ser. PRESENT ECC 5-10 x bigger than block ciphers 21

Alternatives? NTRU Very efficient in HW 3000 GE Not yet stable => flexibility required MQ Algorithms Yet another MQ algorithm broken (SFLASH 2007) Have huge keys etts 1KB Quartz 70KB!!! => high storage effort => expensive 22

Why ECC? ECC Has short key length Has short processing time on 8-bit µc Has short signatures ECC is best suited for pervasive computing 23

Outline Motivation Hardware vs. Software Symmetric Lightweight Cryptography Asymmetric Lightweight Cryptography Conclusion 24

Conclusion Pervasive Computing implies severe constraints: Small area Low power Low energy Short messages S-boxes are expensive in HW but cheap in SW (smaller are better) Permutations can be very efficient in HW and very cumbersome in SW Storage is the most expensive part in hardware 25

Conclusion Lightweight algorithms should Have a short internal state (to lower area) Allow serialization (to lower power) Have a short processing time (to lower energy) Have a short output (to lower communication cost) Should be based on the same primitive Lightweight block ciphers have similar footprint as stream ciphers NTRU might be an alternative to ECC if it becomes stable ECC is best suited for pervasive computing 26

References [FWR05] M. Feldhofer, J. Wolkerstorfer, V. Rijmen, AES Implementation on a Grain of Sand, Information Security, IEE Proceedings, Vol. 152, Nr. 1, pp. 13-20, 2005 [BKL+07] Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe "PRESENT: An Ultra-Lightweight Block Cipher". Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10-13, 2007 [LPP+07] Leander, C. Paar, A. Poschmann, K. Schramm "New Lightweight DES Variants". Fast Software Encryption 2007 - FSE 2007, Luxembourg City, Luxembourg, März 26-28, 2007.A. [VHV+88] I. Verbauwhede, F. Hoornaert, J. Vandewalle, and H. De Man. Security and Performance Optimization of a New DES Data Encryption Chip. IEEE Journal of Solid-State Circuits, 23(3):647?656, 1988. [KP04] Sandeep Kumar, Christof Paar, "Reconfigurable Instruction Set Extension for enabling ECC on an 8-bit Processor", International Conference on Field-Programmable Logic and Applications (FPL) 2004, Antwerp, Belgium, August 30 - September 1, 2004 [KP06] Sandeep Kumar and Christof Paar, Are Standards Compliant Elliptic Curve Cryptosystems feasibe on RFID?, Workshop on RFID Security 2006, Graz, Austria, Juli 2006 [BGK+07] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, ``Public-Key Cryptography for RFID-Tags'', Proceedings of IEEE International Workshop on Pervasive Computing and Communication Security 2007, New York, USA 2007 [W04] Johannes Wolkestorfer, Hardware Aspects of Elliptic Curve Cryptography, Phd Thesis, Graz University of Technology, Graz, Austria, 2004 27

Thank you! Questions? www.crypto.rub.de poschmann@crypto.rub.de