Future Challenges for Lightweight Cryptography
F.-X. Standaert UCL Crypto Group Crypto for 2020, Tenerife, January 2013
Future Challenges for Lightweight Cryptography F.-X. Standaert UCL - - PowerPoint PPT Presentation
Future Challenges for Lightweight Cryptography F.-X. Standaert UCL Crypto Group Crypto for 2020, Tenerife, January 2013 Outline 1 1. Past results 2. Future challenges 1. Block ciphers 2 TEA, NOEKEON, AES, SERPENT, ICEBERG, HIGHT,
Future Challenges for Lightweight Cryptography
F.-X. Standaert UCL Crypto Group Crypto for 2020, Tenerife, January 2013
Outline 1
2
HIGHT, mCrypton, SEA, PRESENT, KATAN, MIBS, LED, Piccolo, Lblock, KLEIN, PRINCE, …
2
HIGHT, mCrypton, SEA, PRESENT, KATAN, MIBS, LED, Piccolo, Lblock, KLEIN, PRINCE, …
2
HIGHT, mCrypton, SEA, PRESENT, KATAN, MIBS, LED, Piccolo, Lblock, KLEIN, PRINCE, …
Comparison issue 3
… and reflect algorithmic and implementation choices
Comparison issue 3
… and reflect algorithmic and implementation choices
Comparison issue 4
… and reflect algorithmic and implementation choices
=> Next: various ECRYPT examples
1.1. Block ciphers in software 5
1.1. Block ciphers in software 5
Code size 6
Code size 6
HW-oriented ciphers are bigger
Code size 6
As well as “standard” ones (but not that much)
Cycle count 7
Cycle count 7
Iteration of many simple functions is slower
RAM 8
RAM 8
Precomputed key-scheduling
RAM 8
Mostly reflects state size
Combined metric 9
Combined metric 9
No huge differences for most ciphers (factor<5)
Combined metric 9
AES behaves pretty good!
Lessons learned 10
Lessons learned 10
Lessons learned 10
http://perso.uclouvain.be/fstandae/source_codes/lightweight_ciphers/
1.2. Block ciphers in hardware 11
1.2. Block ciphers in hardware 11
Case study: min. energy architectures 12
Case study: min. energy architectures 12
? 13
? 12 13
? 12 14
? 12 14
? 12 15
? 12 15
? 12 16
? 12 16
? 12 17
Lessons learned 18
Lessons learned 18
depend on the key scheduling and E/D combination
Lessons learned 18
depend on the key scheduling and E/D combination
all algorithms end up with similar cycle count
Lessons learned 18
depend on the key scheduling and E/D combination
all algorithms end up with similar cycle count
1.3. Technology scaling
19
65nm case study 20
Conclusion 21
Conclusion 21
area), existing candidates are probably good enough
Conclusion 21
area), existing candidates are probably good enough
compared to the one of technology scaling
Conclusion 21
area), existing candidates are probably good enough
compared to the one of technology scaling
perspectives (design techniques, properties, …)
Outline 22
23
RAM 24
* * * * * * * * *
Cycle count 25
Combined metric 26
Open problem 27
Open problem 27
28
(cfr. Stefan Mangard’s talk at the AES day in Bruges)
28
(cfr. Stefan Mangard’s talk at the AES day in Bruges)
28
(cfr. Stefan Mangard’s talk at the AES day in Bruges)
More research needed in this direction
29
29
29
30
30
physical security, e.g. at least quadratically for masking)
30
physical security, e.g. at least quadratically for masking)
By 2020 31
http://perso.uclouvain.be/fstandae/
?
?
Observation: Excepted for extremely simple rounds
Code size ?