DIAC 2013 August 13, 2013
AEAD Ciphers for Highly Constrained Networks
René Struik (Struik Security Consultancy) Slide 1
AEAD Ciphers for Highly Constrained Networks Ren Struik e-mail: - - PowerPoint PPT Presentation
August 13, 2013 DIAC 2013 AEAD Ciphers for Highly Constrained Networks Ren Struik e-mail: rstruik.ext@gmail.com Slide 1 Ren Struik (Struik Security Consultancy) August 13, 2013 DIAC 2013 Outline 1. Highly Constrained Networks
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 1
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 2
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 3
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 4
Wheeling-Pittsburg Steel Corporation
Photo courtesy Dust Networks
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 5
The Promise of Wireless
The Economist, April 28, 2007
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 6
[1] Intel (September 11, 2011); [2] Cisco (July 15, 2011); [3] US DOE Roadmap (2006)
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 7
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 8
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 9
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 10
DIAC 2013 August 13, 2013
TsCCAOffset
CCA TX Packet
TsRxAckDelay AWT
RX ACK prepare to receive T1 T2 T4 T3
Transmitter Unallocated Slot Slot frame cycle Allocated Slot
= transmitting packet = receiver on = receiving packet
Data rate: 250 kbps Max time jitter: 1 ms −best in class: 0.2 ms Power: 10 mW Energy: 0.32µJ/octet Latency: 32µs/octet AES-128: < 25 µW René Struik (Struik Security Consultancy) Slide 11
Timeslot with Acknowledged Transmission
End of timeslot Start of timeslot
TsTxOffset
RX Packet TX ACK
TsRxOffset PWT
prepare to receive
TsTxAckDelay
process packet, prepare to ack R1 R2 R3
Receiver
AWT = receiving packet PWT = TsACKWaitTime = TsPacketWaitTime
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 12
DIAC 2013 August 13, 2013
Transport Application
Application protocol
5 4
Layer
APDU TPDU
Unit
Transport Application
Transport protocol
René Struik (Struik Security Consultancy) Slide 13 Data Link Physical Network Data Link Physical Network Data Link Physical Network Data Link Physical Network
Device A “Tunnel” Device Router
3 2 1 NPDU Frame Bits Data Link Physical Network
Device B
DIAC 2013 August 13, 2013
Transport Application Data AH Data AH Data TH Transport Application 5 4
Layer
APDU TPDU
Unit
René Struik (Struik Security Consultancy) Slide 14 Data Link Physical Network
Device A
AH Data TH NH AH Data TH NH DH AH Data TH NH DH PH Data Link Physical Network
Device B
3 2 1 DF DF NPDU Frame Bits Crypto OFF Crypto ON (Conf. & Auth.)
DIAC 2013 August 13, 2013
Transport Application Data AH Data AC AH Data TH AC TC Transport Application 5 4
Layer
APDU TPDU
Unit
René Struik (Struik Security Consultancy) Slide 15 Data Link Physical Network
Device A
AH Data TH AC TC NH AH Data TH AC TC NH DH DC AH Data TH AC TC NH DH DC PH Data Link Physical Network
Device B
3 2 1 DF DF NPDU Frame Bits Data expansion due to crypto*
*ignoring security admin in headers
Crypto OFF Crypto ON (Conf. & Auth.) 8B 4B 8B 2B
DIAC 2013 August 13, 2013
Transport Application
Application protocol
5 4
Layer
APDU TPDU
Unit
Transport Application
Transport protocol
René Struik (Struik Security Consultancy) Slide 16 Data Link Physical Network Data Link Physical Network Data Link Physical Network Data Link Physical Network
Device A “Tunnel” Device Router
3 2 1 NPDU Frame Bits Data Link Physical Network
Device B
Crypto OFF Crypto ON (Conf. & Auth.)
All crypto processing yields explicit verdict on data authenticity, via Message Authentication Code, but at a cost (data expansion)
DIAC 2013 August 13, 2013
Transport Application Data AH Data AC AH Data TH AC ∅ Transport Application 5 4
Layer
APDU TPDU
Unit
René Struik (Struik Security Consultancy) Slide 17 Data Link Physical Network
Device A
AH Data TH AC ∅ NH AH Data TH AC ∅ NH DH ∅ AH Data TH AC ∅ NH DH ∅ PH Data Link Physical Network
Device B
3 2 1 DF DF NPDU Frame Bits Reduced expansion due to crypto*
*ignoring security admin in headers
Crypto OFF Crypto ON (Conf. & Auth.) Crypto ON (without Data Expansion) DISSOLVED! 8B 4B 8B 2B
DIAC 2013 August 13, 2013
Transport Application
Application protocol
5 4
Layer
APDU TPDU
Unit
Transport Application
Transport protocol
René Struik (Struik Security Consultancy) Slide 18 Data Link Physical Network Data Link Physical Network Data Link Physical Network Data Link Physical Network
Device A “Tunnel” Device Router
3 2 1 NPDU Frame Bits Data Link Physical Network
Device B
Crypto OFF Crypto ON (Conf. & New Auth.) Crypto ON (without Data Expansion)
All crypto processing yields implicit verdict on data authenticity, via catastrophic error produced as soon as data is modified
DIAC 2013 August 13, 2013
Transport Application ∆ατα AH Data AC AH Data TH AC ∅ Transport Application 5 4
Layer
APDU TPDU
Unit
atastrophic Error
Corrupted packet Corrupted data René Struik (Struik Security Consultancy) Slide 19 Data Link Physical Network
Device A
AH Data TH AC ∅ NH AH Data TH AC ∅ NH DH ∅ AH Data TH AC ∅ NH DH ∅ PH Data Link Physical Network
Device B
3 2 1 DF DF NPDU Frame Bits Reduced expansion due to crypto*
*ignoring security admin in headers
Crypto OFF Crypto ON (Conf. & Auth.) Crypto ON (without Data Expansion)
Cata
Modified (encrypted) frame Corrupted (decrypted) frame DISSOLVED! 8B 4B 8B 2B
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 20
1 Some cryptographic rejection possible, if some redundancy sprinkled-in (e.g., by padding with fixed 16-bit string)
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 21
DIAC 2013 August 13, 2013
Transport Application Data AH Data AC AH Data TH AC TC Transport Application 5 4
Layer
APDU TPDU
Unit
René Struik (Struik Security Consultancy) Slide 22 Data Link Physical Network
Device A
AH Data TH AC TC NH AH Data TH AC TC NH DH DC AH Data TH AC TC NH DH DC PH Data Link Physical Network
Device B
3 2 1 DF DF NPDU Frame Bits Data expansion due to crypto*
*ignoring security admin in headers
Crypto OFF Crypto ON (Conf. & Auth.) 8B 4B 8B 2B
DIAC 2013 August 13, 2013
Transport Application Transport Application 5 4
Layer
APDU TPDU
Unit
Ka, Na, La Kt, Nt, Lt Ka, Na, La Kt, Nt, Lt René Struik (Struik Security Consultancy) Slide 23 Data Link Physical Network
Device A
Data Link Physical Network
Device B
3 2 1 NPDU Frame Bits
*ignoring security admin in headers
Crypto OFF Crypto ON (Conf. & Auth.) Kd, Nd, Ld Kd, Nd, Ld
Each layer has its own keying material (key, nonces), but this comes at a cost (replication of key storage, key management)
DIAC 2013 August 13, 2013
Transport Application Transport Application 5 4
Layer
APDU TPDU
Unit
Tag La Tag Lt Tag,La Tag Lt René Struik (Struik Security Consultancy) Slide 24 Data Link Physical Network
Device A
Data Link Physical Network
Device B
3 2 1 NPDU Frame Bits Crypto OFF Crypto ON (Conf. & Auth.) Tag Ld Tag,Ld Key, Nonce Key, Nonce
Each layer reuses same keying material (key, nonces), but does salt this at each layer (reduced key storage & key management)
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 25
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 26
DIAC 2013 July 3, 2013
Security Policies Key Management Applications (Some) authenticity
René Struik (Struik Security Consultancy) Slide 27
Device
AES AES RNG ECC AES K seed (d, Q) Keys Crypto Functions Security Functions Confidentiality, authenticity Authenticity
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 28
DIAC 2013 August 13, 2013
René Struik (Struik Security Consultancy) Slide 29
DIAC 2013 August 13, 2013
Cryptographic Modes of Operation: 1.
Plaintexts for Efficient Cryptography,” in AsiaCrypt’00, T. Okamoto, Ed., Lecture Notes in Computer Science, Vol. 1976, Springer, 2000. 2. J.H. An, M. Bellare, “Does Encryption with Redundancy Provide Authenticity?,” in EUROCRYPT’01,
Finite Field Arithmetic: 3.
softwarecommunity.intel.com, No. 3787, April 11, 2008. 4.
René Struik (Struik Security Consultancy) Slide 30
4.
“Software Implementation of Binary Elliptic Curves: Impact of the Carry-less Multiplier on Scalar Multiplication,” IACR ePrint 2011-170.