Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1
TU Graz/Computer Science/IAIK/VLSI 2007
Martin Feldhofer
IAIK – Graz University of Technology Martin.Feldhofer@iaik.tugraz.at www.iaik.tugraz.at
Strong Crypto for Tiny RFID Tags Challenges and Design Issues 11-13 - - PowerPoint PPT Presentation
VLSI Institute for Applied Information Processing and Communications (IAIK) VLSI & Security Strong Crypto for Tiny RFID Tags Challenges and Design Issues 11-13 July 2007, Malaga, Spain Martin Feldhofer IAIK Graz University of
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1
TU Graz/Computer Science/IAIK/VLSI 2007
Martin Feldhofer
IAIK – Graz University of Technology Martin.Feldhofer@iaik.tugraz.at www.iaik.tugraz.at
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 2
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 3
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 4
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 5
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 6
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
first paper about RFID security at CHES 2002
“…standard crypto too costly on tags…”, “…AES requires 20,000-30,000 gates…”
“… strong crypto is not a realistic option …”
“… only one-way hash function is required…”
“…strong crypto on tags not possible…”
“… symmetric encryption, hash functions, or PRNGS are not possible on tags …”
“… AES much more suitable as hash functions …”
proposals for ECC on tags
“… integrate strong authentication into EPC standard …”
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 7
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Source: TECTEM University of St. Gallen
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 8
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
in 4.5m distance
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 9
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Reader Key K Key K rR
S O F E O F
EK(rR)
S O F E O F
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 10
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
< 1.2 - 5m Reading range < 10 cm < 15µA (scarce) Power consumption ~ 10mA (enough) < 1 mm² Chip area 15 -20mm² minimal, 5-10 Cent Prize (€) some € LF, HF, UHF Frequency HF inventory (until now) Application authentication dedicated circuit Hardware microcontroller non/proprietary Security crypto coprocessor
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 11
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 12
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
RF field RF field Vdd IIC ISupply VddMIN Vdd IIC ISupply VddMIN
– or mean current Iavg
– instead Tmin = #cycles / fmax
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 13
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 14
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 15
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
2 · f
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 16
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
FF
clk din Q dout D
8 8 8
enable
Latch
clk enable EN D Q
FF
din Q dout D
8 8
f g
input
select_f
1 0
f g
input
select_f val select_f
0 1
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 17
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
clocked flip flops and latches
– NAES= 256 bopt = 16 – NSHA-1= 832 bopt = 28.8 – NSHA-256= 1024 bopt = 32 – NTrivium= 288 bopt = 17 – NGrain= 160 bopt = 12.6
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 18
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 19
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 20
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 21
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
included
flops and computational costs
AES-128 Controller RAM 32 x 8-bit Data Unit
start read finished data_out data_in reset enc
„Tina“: Tiny AES
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 22
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
[GEs]
[µA @ 100kHz, 1.5V]
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 23
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
chaining variables
needed
– > 1024 bits
SHA-256 datapath
Datapath
W-RAM
16x32-bit
State- RAM
8x32-bit
H-RAM
8x32-bit
1
1
SHA2 Const T1 T2
Ch Maj
32-bit Adder
dataout datain
A, B, C E, F, G A E
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 24
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
[GEs]
[µA @ 100kHz, 1.5V]
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 25
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Stream data_out data_in Key
Grain datapath Trivium datapath
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 26
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
[GEs]
[µA @ 100kHz, 1.5V]
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 27
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
– State machine: field operations –
ROM1 RAM ROM2
Arithmetic Unit
a(x) a p(x ) p
Carry-save Adder Carry-save Adder
a, a(x) p, p(x) s c b q neg
a 2c c 2s s p p/2 c c/2 s s/2 b/2 s c s s
Reg C Reg S Reg B
p1 c1 s1 c2 s2 a2 b2
Control
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 28
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
[GEs]
[µA @ 100kHz, 1.5V]
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 29
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
AES 3-times smaller
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 30
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Power Timing EM Side channel information
… …
Input Output
Secret key K
Cryptographic device Implementation
Challenge-response protocol AES-128
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 31
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Power/EM traces Cryptographic device Input data AES Power model Input data Statistical Methods (Correlation, Distance of means,..) Model 256 key hypotheses 256 correlation traces Highest absolute peak detected
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 32
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
AES-128 µP Interface Controller RAM 32 x 8-bit Data Unit
write select finished data_out data_in addr read
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 33
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Analysis Attacks – Revealing the Secrets of Smart Cards]
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 34
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
a00 a01 a02 a03 a20 a21 a22 a23 a10 a11 a12 a13 a30 a31 a32 a33 a11 a21 a31 a01 a22 a32 a02 a12 a03 a13 a23 a33 a20 a30 a00 a10
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 35
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
a11 a21 a31 a01 a22 a32 a02 a12 a03 a13 a23 a33 a20 a30 a00 a10 d d d d d d d d d d d d
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 36
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
High-level design capture Logic synthesis Floorplanning Placement and routing Tape-out Special constraints Logic style conversion Conversion rules SR cell library DRP cell library
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 37
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 38
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
http://www.iaik.tugraz.at
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 39
TU Graz/Computer Science/IAIK/VLSI/Feldhofer
Martin Feldhofer Institute for Applied Information Processing and Communications TU Graz - Austria Email: Martin.Feldhofer@iaik.tugraz.at