ECC is Ready for RFID A Proof in Silicon



Similar documents
Lightweight Cryptography From an Engineers Perspective

Strengthen RFID Tags Security Using New Data Structure

Table of Contents. Bibliografische Informationen digitalisiert durch

Cryptographically Secure Pseudo-Random Bit Generator for RFID Tags

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

Triathlon of Lightweight Block Ciphers for the Internet of Things

Let s put together a Manual Processor

Implementation of Full -Parallelism AES Encryption and Decryption

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Side Channel Analysis and Embedded Systems Impact and Countermeasures

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation

Software Implementations of Elliptic Curve Cryptography

CRYPTOG NETWORK SECURITY

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

Implementing Network Security Protocols

IJESRT. [Padama, 2(5): May, 2013] ISSN:

Microtronics technologies Mobile:

Extending ECC-Based RFID Authentication Protocols to Privacy-Preserving Multi-Party Grouping Proofs

FPGA IMPLEMENTATION OF AES ALGORITHM

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Serial port interface for microcontroller embedded into integrated power meter

Multi-Layered Cryptographic Processor for Network Security

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Cryptography and Network Security: Summary

CS101 Lecture 26: Low Level Programming. John Magee 30 July 2013 Some material copyright Jones and Bartlett. Overview/Questions

CRYPTOGRAPHY AND NETWORK SECURITY

Cryptography and Network Security Chapter 10

Cyber Security Practical considerations for implementing IEC 62351

Privacy and Security in library RFID Issues, Practices and Architecture

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Power Reduction Techniques in the SoC Clock Network. Clock Power

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

RFID Security: Attacks, Countermeasures and Challenges

The implementation and performance/cost/power analysis of the network security accelerator on SoC applications

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

ECC over RSA for Asymmetric Encryption: A Review

Public Key Cryptography. Performance Comparison and Benchmarking

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method

Chapter 4 Register Transfer and Microoperations. Section 4.1 Register Transfer Language

A Framework for Security on NoC Technologies

Thanks, But No Thanks

Outline. Performance comparisons of elliptic curve systems in software. Goals. 1. Elliptic curve digital signature algorithm (ECDSA)

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Hardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

On the Security of RFID

The Impact of Cryptography on Platform Security

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

ISSCC 2004 / SESSION 17 / MEMS AND SENSORS / 17.4

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

SECURITY IN LOW RESOURCE ENVIRONMENTS

Reconfigurable Computing. Reconfigurable Architectures. Chapter 3.2

Security in Near Field Communication (NFC)

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Implementation and Design of AES S-Box on FPGA

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

2014 IBM Corporation

Using RFID Techniques for a Universal Identification Device

NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators

Network Security: Cryptography CS/SS G513 S.K. Sahay

Efficient Software Implementation of Public-Key Cryptography on Sensor Networks Using the MSP430X Microcontroller

7! Cryptographic Techniques! A Brief Introduction

Evaluating The Performance of Symmetric Encryption Algorithms

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

Problems of Security in Ad Hoc Sensor Network

Chapter 6 CDMA/802.11i

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Gemalto Mifare 1K Datasheet

Overview. SSL Cryptography Overview CHAPTER 1

Lightweight Encryption Protocol for Passive RFID System using SIMON

Evaluation of Digital Signature Process

Security & Chip Card ICs SLE 44R35S / Mifare

7a. System-on-chip design and prototyping platforms

A Question of Key Length

Paolo Maistri. September 8, Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1?

List of courses MEngg (Computer Systems)

An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths

Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

Mobile Network Security Technology Research Center Kyungpook National University

An Energy Efficient ATM System Using AES Processor

Two Binary Algorithms for Calculating the Jacobi Symbol and a Fast Systolic Implementation in Hardware

Transcription:

ECC is Ready for RFID A Proof in Silicon RFIDsec 08 Presentation Daniel Hein, daniel.hein@gmx.at Johannes Wolkerstorfer, Johannes.Wolkerstorfer@iaik.tugraz.at Norbert Felber, felber@iis.ee.ethz.ch 1

Outline I Radio Frequency Identification (RFID) Product piracy Authentication Elliptic Curve Cryptography (ECC) Montgomery point multiplication Binary extension field arithmetic ECCon processor architecture RFID front-end ECC processor Small datapath Approach Specialized ALU 2

Outline II Digit level algorithms Multiplication Reduction Multiplication with interleaved reduction Results Timing, Area, Power Comparison with related work 3

Radio Frequency Identification Rapid automated item identification Barcode replacement Computer X-ray vision No line of sight No optical scanning RFID Tag Antennae + IC Powered by EM field 4

Product Piracy Causes considerable economic damage Counterfeits inserted in legitimate supply chain RFID tags Alleviate problem Easy to clone Cryptography Authentication 5

Elliptic Curve Cryptography I Public-key cryptography Short key => Small hardware footprint Authentication with digital signature ECDSA Security depends on point multiplication Point multiplication scalar point on elliptic curve Non-invertible 6

Elliptic Curve Cryptography II Point multiplication Point addition Point doubling Montgomery point ladder algorithm Side channel attack resistance Timing based attacks: MPLA Simple power analyses attacks: MPLA Differential power analyses attacks: ECDSA 7

Binary Extension Field Arithmetic Elliptic Curve defined on finite field Finite Fields Fixed size elements Binary extension field Elements = binary polynomials Addition = XOR Required Operations Addition Multiplication Reduction 8

Prerequisites of an RFID application Small die area 15000 gate equivalents Minuscule power consumption 15μA available mean current Constant power consumption Accidental load modulation 9

ECCon Top Level Architecture RFID front end ISO-18000-3-1 compliant Air Interface Power supply Clock generation Signal modulation RART Receive: bit stream to byte Send: byte to bit stream RFID Control Unit (RCU) Communication protocol Manages ECC processor 10

ECC Processor Architecture I Implements point multiplication Fixed 163 bit NIST curve Supports two modes RFID Stand alone Interface two-phase full handshake 8 bit wide Control unit hardwired FSM hierarchy 11

Low Power, Small Area ALU Architectures Bit-serial multiplier current state of the art 2x163 = 326 bits ALU storage Lion's share of power used for clocking the storage I O C o n t r o l 163x6 RAM 163x1 Multiplier 16-bit datapath Used for ISE [GK03a] Conceptually 48-bit ALU storage More power for computation Total power consumption smaller Requires digit based algorithms I O C o n t r o l 64x16 RAM 16x16 Mult. 12

Arithmetic Logic Unit 16x16 GF(2) multiplier 2 Register input selection units 2 16-bit adders (XOR) Registers 32-bit accumulator interleaved reduction 15-bit MC 13-bit RC clock gated 13

Word Size Selection 12 10 8 A*C*P A*C*P 2 A*C 2 *P A*C 2 *P 2 6 4 2 0 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Bit-width 14

Comba Multiplication Two possible digit multiplication algorithms Operand scanning form Product scanning form B[2] B[1] B[0] B[0]A[1] B[0]A[0] A[2] A[1] A[0] Product Scanning Form A.k.a Comba Multiplication Computes result one result digit at the time Optimal operand order minimizes memory access B[2]A[2] B[2]A[1] B[1]A[2] B[1]A[1] B[0]A[2] B[2]A[0] B[1]A[0] P[5] P[4] P[3] P[2] P[1] P[0] 15

Modular Reduction in GF(2 163 ) Multiplication of 2 163-bit elements produces a 325-bit result: a(z)*b(z)=c(z); deg(c(z))=325 Common residue: c(z) c(z) (mod f(z)) f(z) = z 163 +z 7 +z 6 +z 3 +1... irreducible polynomial The common residue is limited in size to 163 bits The common residue is the remainder of a long division by f(z) 16

An Alternate Reduction Method c H0 c L0 324 163 162 0 c L1 168 163 162 0 c H1 c 1 =c H0 *r c L2 12 0 c 2 =c H1 *r c 162 0 c =c L0 +c L1 +c L2 c(z)=c 2m-2 z 2m-2 +...+c m z m +c m-1 z m-1 +...+c 1 z+c 0 (c 2m-2 z m-2 +...+c m )r(z)+c m-1 z m-1 +...+c 1 z+c 0 (mod f(z)), where the reduction polynomial r(z)=f(z)-z 163 =z 7 +z 6 +z 3 +1 17

Interleaved Reduction Step I ACC H C[10] Carry ACC L C H0 [0] L C L0 [10] C[10] 175 163 162 160 MC empty RC empty Computation of the first 10 digits of the product 11 th digit (C[10]) exceeds 163 bit limit Stored in ACC L ACC H contains multiplication carry for 12 th digit C[11] C[10] contains the first 13 bits of C H0 Saved to Reduction Carry register RC 18

Interleaved Reduction Step II C[11] Carry C[11] ACC H ACC L C H0 [1] L C H0 [0] H 191 179 178 176 MC empty RC C H0 [0] L ACC H C[11] Carry ACC L C H0 [0] 178 163 MC C[11] Carry RC C H0 [1] L Upon computation of 12 th digit (C[11]) Last 3 bits of C H0 [0] become available C H0 [0] is restored in ACC L, lower 13 bit of C H0 [0] saved to RC Multiplication carry is saved to Multiplication Carry register MC 19

Interleaved Reduction Step III ACC H (C H0 [0] *r(z)) H ACC L (C H0 [0] *r(z)) L 15 0 MC C[11] Carry RC C H0 [1] L Multiplication of 1 st digit of C H0 (C H0 [0]) with r(z) produces 1 st digit of C 1 (C L1 [0]) Addition of C L1 [0] to C L0 [0], Sum stored to result memory Exchange of reduction multiplication carry and nominal multiplication carry 20

Interleaved Reduction Step IV C[12] ACC H ACC L C H0 [2] L C H0 [1] H C[12] Carry 207 195 194 192 MC (C H0 [0] *r(z)) H RC C H0 [1] L The next digit of the product (C[12]) is computed Requires several MAC operations Interleaved reduction steps I to IV repeat until all digits of C 1 are processed Process is repeated for C 2 Single multiplication and addition 21

ECCon Low power, small area ECC point multiplication device ISO-18000-3-1 compatible digital RFID front-end Technology: UMC L180 GII 1P/6M 1.8V/3.3V CMOS Core Size: 219897 μm2 Clock Frequency: 46 MHz ECC processor power consumption at 106 khz: 10.8 μw Built-in memory self-test/full scan using one scan chain 22

Results I - Timing Maximum frequencies: UMC 180: 46 MHz (unconstrained) AMS c35: 20 MHz (constrained) Carrier frequency: f c =13.56 MHz RFID front-end RART: 6.78 MHz RCU: 106 khz (f c /128, clock gated) ECC processor 850 khz (f c /16, clock gated) 23

Area & Power Area Power [μw] @ Component [μm 2 ] [GE] [%] 6,78 MHz 848 khz 106 khz ECCon 144,823 14,976 100.00% 176 87 11.4 RCU 8,290 857 5.72% 10 1 0.2 RART 8,054 833 5.56% 20 3 0.4 ECC core 128,098 13,247 88.45% 146 83 10.8 Memory 91,117 9,423 62.92% 56 32 4.3 ALU 16,863 1,744 11.64% 44 40 5.0 Control (est.) 20,118 2,080 13.89% 46 11 1.5 24

Power Simulation 25

Comparison with related work Source Area [GE] Runtime [kcycles] Field Technology [FWR05] 3.400 1 AES AMS 350nm ECCon w/o key 11.904 296 GF(2 163 ) UMC 180nm [BBD + 08] 12.876 80 GF(2 163 ) INF 220nm [LSBV08] 12.168 272 GF(2 163 ) TSMC 130nm [LV07] 13.182 314 GF(2 163 ) TSMC 180nm [KP06] 15.094 430 GF(2 163 ) AMI 350nm [Wol05] 23.000 426 GF(2 191 ) AMS 350nm [FFW07] 23.656 502 GF(2 192 ) AMS 350nm Source Power [μw] I mean [μa] f [MHz] Technology [FWR05] 4,50 3,00 106 khz AMS 350nm [BBD + ] 79,00? 847 khz INF 220nm [LSBV08] 51,85? 1.364 MHz TSMC 130nm ECCon 10,80 6,00 106 khz UMC 180nm ECCon 54,70 21,88 106 khz AMS 350nm ECCon 83,00 46,11 847 khz UMC 180nm [FFW07] 141,00 42,73 106 khz AMS 350nm 26

Comparison with related work II ECCon [BBD + ] [%] Memory 8080 5273 65,26% ALU 1744 6171 353,84% Control 2080 1432 68,85% ECCon Memory Total 11904 12876 108,17% higher requirements due to Register based approach Additional 163 bits storage ALU Very compact due to small datapath Control Increased complexity due to digit based algorithms 27

Thank you for your attention. Questions? 28

[GK03a] [FWR05] References I Johann Großschädl and Guy-Armand Kamendje. Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2 m ). In Proc. IEEE International Conference on Application-Specific Systems, Architectures, and Processors, pages 455 468, 2003. M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. Aes implementation on a grain of sand. IEEE Proceedings Information Security, 152(1):13 20, 2005. [BBD+08] Holger Bock, Michael Braun, Markus Dichtl, Erwin Hess, Johann Heyszl, Walter Kargl, Helmut Koroschetz, Bernd Meyer and Hermann Seuschek. A milestone towards rfid products offering asymmetric authentication based on elliptic curve cryptography. In Workshop on RFID Security, 2008 29

References II [LSBV08] Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, and Ingrid Verbauwhede. A compact ECC processor for pervasive computing. Presentation at Secure Component and System Identification (SECSI), 2008 [LV07] Yong Ki Lee, Ingrid Verbauwhede. A compact architecture for Montgomery elliptic curve scalar multiplication processor. In Proc. International Workshop on Information Security Applications (WISA), 2007. [KP06] S.Kumar and C. Paar. Are standards compliant elliptic curve cryptosystems feasible on RFID? Printed handout of Workshop on RFID Security (RFIDSec06), 2006 [Wol05] Johannes Wolkerstorfer. Is elliptic-curve cryptography suitable to to secure RFID tags? In Workshop on RFID and Lightweight Crypto, 2005 30

References III [FW07] F. Fürbaß, and J. Wolkerstorfer. ECC processor with low die size for RFID applications. In Proc. IEEE International Symposium on Circuits and Systems ISCAS 2007, pages 1835 1838, 2007. [OScE04] E. Öztürk, B. Sunar, and Savaç, E. Low-power elliptic curve cryptography using scaled modular arithmetic. In Cryptographic Hardware and Embedded System (CHES), 2004 31