. . . . . .
Permutation Based Cryptography for IoT
Permutation Based Cryptography for IoT
Guido Bertoni1 Joint work with Joan Daemen1, Michaël Peeters2 and Gilles Van Assche1
1STMicroelectronics 2NXP Semiconductors
Permutation Based Cryptography for IoT Guido Bertoni 1 Joint work - - PowerPoint PPT Presentation
. . . . . . Permutation Based Cryptography for IoT Permutation Based Cryptography for IoT Guido Bertoni 1 Joint work with CIoT 2012, Antwerp, November 21 Joan Daemen 1 , Michal Peeters 2 and Gilles Van Assche 1 1 STMicroelectronics 2 NXP
. . . . . .
Permutation Based Cryptography for IoT
1STMicroelectronics 2NXP Semiconductors
. . . . . .
Permutation Based Cryptography for IoT Internet of Things Cryptographic Requirements
. . . . . .
Permutation Based Cryptography for IoT Internet of Things Cryptographic Requirements
. . . . . .
Permutation Based Cryptography for IoT Internet of Things Cryptographic Requirements
. . . . . .
Permutation Based Cryptography for IoT Internet of Things Cryptographic Requirements
. . . . . .
Permutation Based Cryptography for IoT Permutation-based crypto: the sponge construction
. . . . . .
Permutation Based Cryptography for IoT Security of the sponge construction
. . . . . .
Permutation Based Cryptography for IoT Applications What can you do with a sponge function?
. . . . . .
Permutation Based Cryptography for IoT Applications What can you do with a sponge function?
. . . . . .
Permutation Based Cryptography for IoT Applications What can you do with a sponge function?
. . . . . .
Permutation Based Cryptography for IoT Applications What can you do with a sponge function?
. . . . . .
Permutation Based Cryptography for IoT Authenticated encryption Remember MAC generation
. . . . . .
Permutation Based Cryptography for IoT Authenticated encryption Remember stream encryption
. . . . . .
Permutation Based Cryptography for IoT Authenticated encryption And now together!
. . . . . .
Permutation Based Cryptography for IoT The duplex construction Sister construction of sponge opening new applications
. . . . . .
Permutation Based Cryptography for IoT The duplex construction The SpongeWrap mode
. . . . . .
Permutation Based Cryptography for IoT The duplex construction The SpongeWrap mode
. . . . . .
Permutation Based Cryptography for IoT The duplex construction The SpongeWrap mode
. . . . . .
Permutation Based Cryptography for IoT Sponge functions: are they real?
. . . . . .
Permutation Based Cryptography for IoT On the efficiency of permutation-based cryptography
. . . . . .
Permutation Based Cryptography for IoT On the efficiency of permutation-based cryptography
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Distinguishing vulnerability in keyed vs unkeyed modes
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Distinguishing vulnerability in keyed vs unkeyed modes
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Distinguishing vulnerability in keyed vs unkeyed modes
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Distinguishing vulnerability in keyed vs unkeyed modes
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Boosting keyed permutation modes Introducing dedicated variants
. . . . . .
Permutation Based Cryptography for IoT Proposal for IoT
. . . . . .
Permutation Based Cryptography for IoT Proposal for IoT
. . . . . .
Permutation Based Cryptography for IoT Proposal for IoT
. . . . . .
Permutation Based Cryptography for IoT Proposal for IoT
. . . . . .
Permutation Based Cryptography for IoT Proposal for IoT
. . . . . .
Permutation Based Cryptography for IoT Proposal for IoT
. . . . . .
Permutation Based Cryptography for IoT That’s it, folks!