Efficiency and agility: in secure hardware and in life!
Nele Mentens
KU Leuven, ESAT, imec-COSIC and ES&S nele.mentens@kuleuven.be
Efficiency and agility: in secure hardware and in life! Nele - - PowerPoint PPT Presentation
Efficiency and agility: in secure hardware and in life! Nele Mentens KU Leuven, ESAT, imec-COSIC and ES&S nele.mentens@kuleuven.be High-Tech Women, TU Darmstadt, March 4, 2020 Motivation Secure hardware: Why? What? How? High-Tech Women,
KU Leuven, ESAT, imec-COSIC and ES&S nele.mentens@kuleuven.be
High-Tech Women, TU Darmstadt, March 4, 2020
low power/energy low cost high performance security
data that are personal or company-critical.
‐ the power/energy consumption, ‐ the performance, ‐ the cost
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
low energy – pacemaker low cost – disposable medical sensors high performance – video conferencing low power – RFID access control
Different applications have different requirements:
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
sufficient to meet the requirements.
computations, like cryptographic operations, to be done in hardware. performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor ASIC
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
sufficient to meet the requirements.
computations, like cryptographic operations, to be done in hardware. performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor ASIC
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
Motivation
High-Tech Women, TU Darmstadt, March 4, 2020
High-Tech Women, TU Darmstadt, March 4, 2020
concentrates on shrinking
Goal #1: Efficiency
concentrates on shrinking
Moore’s law
– due to physical challenges, – due to the high cost for silicon manufacturing plants to move to the next process node.
… …
Goal #1: Efficiency
concentrates on shrinking
Moore’s law
– due to physical challenges, – due to the high cost for silicon manufacturing plants to move to the next process node.
improve efficiency
… …
Goal #1: Efficiency
– Ultra low-cost circuits on flexible plastic substrates – Ultra low-power/low-energy circuits in deep submicron technology
– Ultra high-performance network intrusion detection on FPGA
low energy low cost high performance low power
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
– Ultra low-cost circuits on flexible plastic substrates – Ultra low-power/low-energy circuits in deep submicron technology
– Ultra high-performance network intrusion detection on FPGA
– with respect to performance, power/energy consumption, and cost – with respect to security threats
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
– Ultra low-cost circuits on flexible plastic substrates – Ultra low-power/low-energy circuits in deep submicron technology
– Ultra high-performance network intrusion detection on FPGA
– with respect to performance, power/energy consumption, and cost – with respect to security threats
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
silicon (10 nm) plastics (5 µm) Core supply voltage 0.7 V 5-10 V Charge carrier mobility 500-1500 cm2/Vs 2-20 cm2/Vs Transistor density ~ 45 mio per mm2 103-104 per cm2 Semiconductor type n-type and p-type
Cost per 1000 transistors > 0.3 USD > 0.01 USD Flexible? no yes Higher power consumption Lower performance Larger area Unipolar logic Lower cost Bendable, stretchable
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
– First challenge: integrate working crypto cores in the flexible chip
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
– First challenge: integrate working crypto cores in the flexible chip
– Second challenge: prevent the key bits from being read out
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
48 pads for I/O, VDD, Vbias and GND
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
level shifters probe card FPGA chip
Goal #1: Efficiency
– First challenge: integrate working crypto cores in the flexible chip
– Second challenge: prevent the key bits from being read out
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
in a visually indistinguishable way
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
in a visually indistinguishable way
transistor through lasering
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
The temperature change caused by lasering, shifts the threshold voltage (VT) and thus the Id - Vg graph With a fixed input voltage (Vneg), the TFT switches from off to on
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
– First challenge: integrate working crypto cores in the flexible chip
– Second challenge: prevent the key bits from being read out
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
[1] N. Mentens, J. Genoe, T. Vandenabeele, L. Verschueren, D. Smets, W. Dehaene, and K. Myny, Security on Plastics: Fake or Real?, CHES 2019.
Goal #1: Efficiency
High-Tech Women, TU Darmstadt, March 4, 2020
High-Tech Women, TU Darmstadt, March 4, 2020
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
DES A5/1 MD5 SHA1 RC4
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020 A5/1 SHA1 MD5 RC4 DES
A5/1 SHA1
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020 MD5 RC4 DES
Goal #2: Agility
TA Kocher CRYPTO‘96 Goal #2: Agility
TA Kocher CRYPTO‘96 FA Boneh et al. EUROCRYPT‘97 Goal #2: Agility
TA Kocher CRYPTO‘96 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Goal #2: Agility
TA Kocher CRYPTO‘96 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Goal #2: Agility
TA Kocher CRYPTO‘96 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 Optical FA Skorobogatov et al. CHES‘02 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Exploiting algebra Coron CHES’99 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 Optical FA Skorobogatov et al. CHES‘02 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 Dynamic reconfiguration Mentens et al. CHES’08 SABL Tiri et al. ESSCIRC’02 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 Dynamic reconfiguration Mentens et al. CHES’08 SABL Tiri et al. ESSCIRC’02 Random delays Coron et al. CHES’09 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 Dynamic reconfiguration Mentens et al. CHES’08 SABL Tiri et al. ESSCIRC’02 Random delays Coron et al. CHES’09 Leakage-resilient crypto Pietrzak EUROCRYPT’09 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 Horizontal CPA Clavier eprint‘10 Dynamic reconfiguration Mentens et al. CHES’08 SABL Tiri et al. ESSCIRC’02 Random delays Coron et al. CHES’09 Leakage-resilient crypto Pietrzak EUROCRYPT’09 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 Horizontal CPA Clavier eprint‘10 Dynamic reconfiguration Mentens et al. CHES’08 SABL Tiri et al. ESSCIRC’02 Random delays Coron et al. CHES’09 Leakage-resilient crypto Pietrzak EUROCRYPT’09 ML-based SCA Hospodar et al. JCEN’11 Goal #2: Agility
TA Kocher CRYPTO‘96 DPA Kocher et al. CRYPTO‘99 HO-DPA Chari et al. – Messerges CRYPTO’99 – CHES’00 EMA Gandolfi et al. – Quisquater et al. CHES’01 – E-Smart’01 FA Boneh et al. EUROCRYPT‘97 DFA Biham et al. CRYPTO‘97 Template attacks Chari et al. CHES‘02 CPA Brier et al. CHES‘04 Optical FA Skorobogatov et al. CHES‘02 TI Nikova et al. ICICS‘06 Boolean masking Chari et al. – Goubin et al. CRYPTO’99 – CHES’99 Gate-level masking Ishai et al. CRYPTO’03 Exploiting algebra Coron CHES’99 DPA glitches Mangard et al. CT-RSA‘05 Horizontal CPA Clavier eprint‘10 Dynamic reconfiguration Mentens et al. CHES’08 SABL Tiri et al. ESSCIRC’02 Random delays Coron et al. CHES’09 Leakage-resilient crypto Pietrzak EUROCRYPT’09 ML-based SCA Hospodar et al. JCEN’11 Changing of the guards Daemen CHES’17 Goal #2: Agility
performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor
ASIC
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor
programmability/productivity
Low High
ASIC
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor
programmability/productivity
Low High
Research question: how can we achieve maximal performance, minimal power/energy consumption and minimal cost in combination with a high level of programmability/productivity?
ASIC configurable hardware (e.g. FPGA) ASIC
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor
programmability/productivity
Low High
Best option for cryptographic agility?
ASIC
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
performance
High Low
cost (for large volumes)
Low High
power/energy consumption
Low High configurable hardware (e.g. FPGA) domain-specific processor (e.g. DSP) general- purpose processor
programmability/productivity
Low High ASIC
Best option for cryptographic agility? Are there better solutions?
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
synthesis mapping + place & route design entry schematic, HDL, HLS,… netlist physical layout bitstream generation bitstream FPGA configuration
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
synthesis mapping + place & route design entry schematic, HDL, HLS,… netlist physical layout bitstream generation bitstream FPGA configuration RE-USE
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
3x – 9x area decrease
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
similar speed
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
3x – 9x configuration memory decrease
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
– Configurable logic integrated in ASICs – Growing market (QuickLogic, Achronix, Flex Logix, Menta)
existing FPGAs
– Following the trend of adding dedicated features such as BRAM, DSP slices, microprocessors, fast carry chains,…
Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
synthesis mapping + place & route design entry schematic, HDL, HLS,… netlist physical layout RE-USE
LIACS, October 9, 2019
[2]
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow, FCCM 2018. [3]
Reconfigurable Logic Circuit, Patent Application No. PCT/EP2018/081673. Goal #2: Agility
High-Tech Women, TU Darmstadt, March 4, 2020
High-Tech Women, TU Darmstadt, March 4, 2020
High-Tech Women, TU Darmstadt, March 4, 2020
– External help (cleaning, taking care of kids) – Combination with partner’s job
– Impossible to be the perfect mom and the perfect wife in perfect shape in a perfectly clean house with perfectly raised kids and an outstanding career
High-Tech Women, TU Darmstadt, March 4, 2020
– Sports, sleep
– Sports + friends – Sports + family – Travel (work) + time for myself + sleep – Work + friends – Bad combination: work + kids
High-Tech Women, TU Darmstadt, March 4, 2020
[Bryan Dyson, former CEO of Coca-Cola]
High-Tech Women, TU Darmstadt, March 4, 2020