ascon
play

ASCON Submission to the CAESAR Compe44on Christoph Dobraunig, Maria - PowerPoint PPT Presentation

ASCON Submission to the CAESAR Compe44on Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Mar4n Schlffer DIAC 2016 Our Team Christoph Dobraunig Maria Eichlseder Florian Mendel Mar4n Schlffer ASCON Main Design Goals


  1. ASCON Submission to the CAESAR Compe44on Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Mar4n Schläffer DIAC 2016

  2. Our Team • Christoph Dobraunig • Maria Eichlseder • Florian Mendel • Mar4n Schläffer

  3. ASCON Main Design Goals • Security • Online • Efficiency • Single pass • Lightweight • Scalability • Simplicity • Side-Channel Robustness

  4. ASCON General Overview • Nonce-based AE scheme • Sponge inspired ASCON-128 ASCON-128a Security 128 bits 128 bits Rate (r) 064 bits 128 bits Capacity (c) 256 bits 192 bits State size (b) 320 bits 320 bits

  5. ASCON Working Principle The encryp4on process is split into four phases: • Ini4aliza4on • Associated Data Processing • Plaintext Processing • Finaliza4on

  6. ASCON Ini4aliza4on • Ini<aliza<on: updates the 320-bit state with the key K and nonce N r b p a IV k K k N c 0 ∗ k K

  7. ASCON Associated Data • Associated Data Processing : upda4ng the 320-bit state with associated data blocks A i A 1 A s r r p b p b c c c 0 ∗ k 1

  8. ASCON Encryp4on • Plaintext Processing : inject plaintext blocks P i in the state and extract ciphertext blocks C i P t − 1 C t − P 1 C 1 P t C t 1 r r p b p b c c c

  9. ASCON Finaliza4on • Finaliza<on: inject the key K and extracts a tag T for authen4ca4on r p a c k T K k 0 ∗ K

  10. ASCON Permuta4on • SP-Network: x 0 x 1 – S-Layer: x 2 x 3 x 4 x 0 x 1 x 1 – P-Layer: x 2 x 3 x 4

  11. ASCON Permuta4on: S-Layer x 0 x 1 x 2 x 3 x 4 • Algebraic Degree 2 – Ease TI (3 shares) 5 5 5 5 5 • Branch Number 3 – Good Diffusion • Bit-sliced Impl. 5 x 0 x 1 x 2 x 3 x 4

  12. ASCON Permuta4on: P-Layer • Branch Number 4 Σ 0 (x 0 ) = x 0 � (x 0 � 19) � (x 0 � 28) Σ 0 ( x 0 ) = x 0 ⊕ ( x 0 o 19) ⊕ ( x 0 o 28) Σ 1 (x 1 ) = x 1 � (x 1 � 61) � (x 1 � 39) Σ 1 ( x 1 ) = x 1 ⊕ ( x 1 o 61) ⊕ ( x 1 o 39) Σ 2 (x 2 ) = x 2 � (x 2 � 1) � (x 2 � 6) Σ 2 ( x 2 ) = x 2 ⊕ ( x 2 o 1) ⊕ ( x 2 o 6) Σ 3 (x 3 ) = x 3 � (x 3 � 10) � (x 3 � 17) Σ 3 ( x 3 ) = x 3 ⊕ ( x 3 o 10) ⊕ ( x 3 o 17) Σ 4 (x 4 ) = x 4 � (x 4 � 7) � (x 4 � 41) Σ 4 ( x 4 ) = x 4 ⊕ ( x 4 o 7) ⊕ ( x 4 o 41)

  13. ASCON Tweak: Addi4on of Constants • Modifica4on of the round constant schedule • Similar to FIPS 202 • Increase compa4bility with other sponge modes • No impact on exis4ng security analysis

  14. ASCON Security Analysis • Differen4al and Linear Cryptanalysis Rounds Differen<al Linear 1 1 1 2 4 4 3 15 13 4 44 43 ≥ 50l > 640l > 640l ASIACRYPT 2015

  15. ASCON Security Analysis • Analysis of round-reduced versions Method Rounds Complexity cube-like 5/12 2 35 6/12 2 66 differen<al- 4/12 2 18 linear 5/12 2 36 CT-RSA 2015

  16. ASCON Implementa4on/Performance • Sohware – Intel Core2 Duo – ARM Cortex-A8 • Hardware – High-speed – Low-area

  17. ASCON Sohware Implementa4on • Intel Core2 Duo 64 512 1024 4096 ASCON-128 22.0 15.9 15.6 15.2 (cycles/byte) ASCON-128a 17.7 11.0 10.5 10.3 (cycles/byte) Dobraunig, Schläffer

  18. ASCON Sohware Implementa4on • Intel Haswell (four message per core) 64 512 1024 4096 ASCON-128 10.5 7.3 7.1 6.9 (cycles/byte) ASCON-128a 8.5 5.3 5.0 4.8 (cycles/byte) Dobraunig, Senher

  19. ASCON Hardware Implementa4on • Unprotected Implementa4ons Variant 1 Variant 2 Variant 3 Area 7.1 24.9 2.6 (kGE) Throughput 5 524 13 218 14 (Mbps) DSD 2015

  20. ASCON Hardware Implementa4on • Threshold Implementa4ons Variant 1 Variant 2 Variant 3 Area 28.6 123.5 7.9 (kGE) Throughput 3 774 9 018 14 (Mbps) DSD 2015

  21. ASCON Applica4ons (Use Cases) • Lightweight Applica4ons Internet of Things • High-Performance Applica4ons • Defense in Depth

  22. ASCON Lightweight Applica4ons • Small hardware area • Efficiency in hardware • Natural side-channel protec4on • Limited damage in misuse sekngs • Low overhead for short messages

  23. ASCON High-Performance Applica4ons • Efficiency on modern CPUs • Efficiency on dedicated hardware • Natural side-channel protec4on

  24. Thank you! hmp://ascon.iaik.tugraz.at

  25. References Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Mar4n Schläffer. • Cryptanalysis of Ascon. CT-RSA 2015 Christoph Dobraunig, Maria Eichlseder, Florian Mendel . • Heuris<c Tool for Linear Cryptanalysis with Applica<ons to CAESAR Candidates. ASIACRYPT 2015 Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer. • Suit up! Made-to-Measure Hardware Implementa<ons of Ascon. DSD 2015 Philipp Jovanovic, Atul Luykx, Bart Mennink. • Beyond 2^(c/2) Security in Sponge-Based Authen<cated Encryp<on Modes. ASIACRYPT 2014 Elena Andreeva, Joan Daemen, Bart Mennink, Gilles Van Assche. • Security of Keyed Sponge Construc<ons Using a Modular Proof Approach. FSE 2015 Yosuke Todo. • Structural Evalua<on by Generalized Integral Property. EUROCRYPT 2015

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend