lightweight cryptography
play

Lightweight Cryptography Mission Accomplished? Peter Rombouts - PowerPoint PPT Presentation

Lightweight Cryptography Mission Accomplished? Peter Rombouts ECRYPT II Closing Event Cryptography for 2020 Tenerife January 23 rd , 2013 Organization Lightweight Cryptography: Mission Accomplished? Introduction Technical perspective


  1. Lightweight Cryptography Mission Accomplished? Peter Rombouts ECRYPT II Closing Event Cryptography for 2020 Tenerife January 23 rd , 2013

  2. Organization Lightweight Cryptography: Mission Accomplished? Introduction Technical perspective Business perspective Examples Evaluation Next? PUBLIC 2 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  3. Introduction Why Lightweight Cryptography? RFID tags – Small transponders, command-reply interrogation by a reader – Passively powered by reader field (not always) What if… … cryptography was possible on these devices ? – Applications ? – Technical constraints ? PUBLIC 3 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  4. Introduction Applications Luxury Goods Anti-counterfeiting Privacy Untraceability Perishable Goods Quality monitoring Storage Warranty Certificates PUBLIC 4 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  5. Introduction Technical constraints Cost of RFID tag – RFID market is cost driven – Cost determined by • Area of tag (GE) • Silicon process technology • Assembly Read range – Application specific requirement – Read range determined by • Power consumption • Operating Frequency Transaction time – Application specific requirement – Transaction time determined by • Clock speed & Memory access Robustness against attacks PUBLIC 5 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  6. Progress Algorithms & Implementations 9000 8000 AES (128/128) PRESENT (80/64) 7000 mCrypton (64/64) 6000 Gate Count KATAN (80/32-64) 5000 HIGHT (64/64) 4000 PUFFIN (128/64) 3000 TWINE (80/64) LED (64/64) 2000 KLEIN (80/64) 1000 PICCOLO (80/64) 0 2000 2004 2008 2012 PUBLIC 6 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  7. Progress Algorithms & Implementations 1400 AES (128/128) 1200 Latency (cycles/block) PRESENT (80/64) 1000 mCrypton (64/64) KATAN (80/32-64) 800 HIGHT (64/64) 600 PUFFIN (128/64) TWINE (80/64) 400 LED (64/64) 200 KLEIN (80/64) PICCOLO (80/64) 0 2000 2004 2008 2012 PUBLIC 7 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  8. Progress Algorithms & Implementations 9000 8000 AES (128/128) PRESENT (80/64) 7000 mCrypton (64/64) 6000 Gate Count KATAN (80/32-64) 5000 HIGHT (64/64) 4000 PUFFIN (128/64) 3000 TWINE (80/64) LED (64/64) 2000 KLEIN (80/64) 1000 PICCOLO (80/64) 0 0 250 500 750 1000 1250 Latency (cycles/block) PUBLIC 8 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  9. Progress Standardization: ISO/IEC 29192 ISO/IEC 29192: Information technology – Security techniques – Lightweight cryptography – Part 1: General PUBLISHED • Security requirements, • Classification requirements • Implementation requirements PUBLISHED – Part 2: Block ciphers • PRESENT: block size of 64 bits and a key size of 80 or 128 bits; • CLEFIA: block size of 128 bits and a key size of 128, 192 or 256 bits. PUBLISHED – Part 3: Stream ciphers • Enocoro: key size of 80 or 128 bits; • Trivium: key size of 80 bits. – Part 4: Mechanisms using asymmetric techniques • Under Development PUBLIC 9 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  10. Progress Standardization: EPC Global EPC Gen-2 UHF RFID Protocol REVIEW – For Communications at 860 MHz – 960 MHz – Version 2.0.0 New Commands – Security – Challenge – KeyUpdate – Authenticate – TagPrivilege – AuthComm – ReadBuffer – SecureComm – Untraceable Commands – File Management – FileOpen – FilePrivilege – FileList – FileSetup Mirrored in ISO/IEC 18000-63 PUBLIC 10 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  11. Progress Standardization: EPC Global Interrogator Interrogator Tag Tag (Cryptographic Suite) (Standard) (Standard) (Cryptographic Suite) Air interface & Commands Interrogator processing: Message construction Message – Defined by EPC Authenticate Message Global Message Tag processing: - Message processing - Response construction Response IPReply (Done) Response Cryptographic Response 2 step Interrogator processing: interro- - Response processing functionality gator - Message construction authen- Message tication – Defined by Authenticate Message ISO/IEC 29167 Message Tag processing: IPReply (Busy) - Message processing - Response construction Response IPReply (Done) Response State machine Response – Each standard Interrogator processing: Response processing EPC Air Interface Authentication Protocol / SecureComm PUBLIC 11 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  12. Progress Standardization: ISO/IEC 29167 ISO/IEC 29167 : Information technology – Automatic identification and data capture techniques – Part 1: General PUBLISHED – Part 10: AES-128 (CD) – Part 11: Present 80 (CD) – Part 12: ECC-DH (CD) – Part 13: Grain-128A (WD) – Part 14: AES-OFB (WD) – Part 15: XOR (WD) – Part 16: ECDSA ECDH (CD) – Part 17: Crypto GPS (CD) – Part 1x: HB2 (NWIP) – Part 1x: RAMON (NWIP) PUBLIC 12 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  13. Lightweight Cryptography YES Did it deliver on its promise? NXP UCODE Crypto PRESENT-80 crypto core – ISO 29192-2 compliant – Only Tag Authentication Silicon available Chip size 0.7 mm2 I2C interface 4kb memory Also an ECC version PUBLIC 13 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  14. Lightweight Cryptography YES Did it deliver on its promise? PASTEUR Sensor Platform NXP UCODE I2C Sensor: MIST 1431 (RH, T, light)  SEN 300 LPC 1114 Batteries (only for sensor) Single chip solution PUBLIC 14 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  15. Lightweight Cryptography MAYBE Unsolved issues Applications require more than just the crypto core ! Protocol: Randomness Device: Secure Storage Robustness: Countermeasures PUBLIC 15 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  16. Lightweight Cryptography New directions Countermeasures – Currently: add-on – Future: Algorithms designed to be protected Other primitives – Hash, Public Key Low-latency – Lightweight primitives useful for other applications? – Ultra-high speed applications – Some algorithms better than others PUBLIC 16 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  17. Low-Latency Cryptography Applications When response time is critical – Solid state disk – Network – Real time When clock frequency is limited – FPGA Energy efficiency – Wireless sensors – Batteries PUBLIC 17 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  18. Low-Latency Cryptography Evaluation results 400 350 AES (128/128) Gate Count (kGE) 300 PRESENT (80-128/64) 250 mCrypton (64-96-128/64) MINI-AES (64/64) 200 NOEKEON (128/128) 150 LED (64-128/64) 100 KLEIN (80-96-128/64) PRINCE (128/64) 50 0 0 10 20 30 40 50 Latency (ns) PUBLIC 18 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  19. Conclusions Lightweight Cryptography A lot of progress has been made – Algorithms & Implementations – Eco-system: Standards It has been integrated into products – Focus on Tag Authentication – Inclusion of sensors Some unsolved issues New applications emerging – Low-latency Cryptography There is still a lot to be explored ! PUBLIC 19 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

  20. PUBLIC 20 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend