logo hardware side of cryptography anestis bechtsoudis [email protected] patra 2010

19
LOGO Hardware side of Cryptography Anestis Bechtsoudis [email protected] Patra 2010

Upload: gwenda-holt

Post on 13-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

LOGO

Hardware side of Cryptography

Anestis Bechtsoudis

[email protected]

Patra 2010

Page 2: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Hardware side of Cryptography

Contents

Introduction1

Cryptography2

Software vs. Hardware3

Reconfigurable Hardware4

Conclusions5

2

Page 3: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

1.1. Introduction

3

Hardware side of Cryptography

Page 4: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Introduction 1/2

Shift to embedded & special purpose devices

Increase of electronic transactions & eCommerce

Large amount (soon bigger) of sensitive data transferred through insecure communication channels

Hardware side of Cryptography

4

Page 5: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Introduction 2/2

Imperative need to work under a secure model Prevent unauthorized access Warranty authenticity and integrity Protect privacy

Application specific security level

Software, hardware and smart card cryptographic solutions

Hardware side of Cryptography

5

Page 6: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

2.2. Cryptography

6

Hardware side of Cryptography

Page 7: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Cryptography 1/3

Cryptographic algoritmhs classes Secret/Symmetric key ciphers (DES, AES,

IDEA, Cast128, Camellia) Public/Assymetric key ciphers (RSA, ECC) Hash functions (MD5, SHA2, Whirlpool)

Modern ciphers designed to achieve high throughputs through high parallelism in hardware.

Hardware side of Cryptography

7

Page 8: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Cryptography 2/3

Advantages of secret key ciphers higher rates of data throughput compared to

public ciphers hardware implementations achieve encrypt rates

of hundreds of megabytes per second software implementations achieve throughput

rates of megabytes per second much less computationally intensive than public

key algorithm

Hardware side of Cryptography

8

Page 9: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Cryptography 3/3

Secret key ciphers operations bit shuffling (permutation) simple non-linear functions implemented as

lookup tables (S-Boxes) linear mixing (modulo) using XOR networks

Public key ciphers operations modular addition/subtraction modular multiplication-exponentiation variable length rotation

Hardware side of Cryptography

9

Page 10: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

3.3. Hardware vs. Software

10

Hardware side of Cryptography

VS.

Page 11: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Hardware vs. Software 1/2

Software+ Ease of use+ Ease of upgrade+ Portability+ Low development costs+ Flexibility- Low speed- High power consumption- Limited security

CryptographicImplementations

Hardware+ Low prices per unit+ High speeds+ Low power consumption+ High parallelism level+ High level security- High development costs- Lack of flexibility

! What about reconfigurable hardware?

Hardware side of Cryptography

11

Page 12: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Hardware vs. Software 2/2

Crypto -Crypto -SystemSystem

CostCost

PerformancePerformance

SecuritySecurity

12

Hardware side of Cryptography

Page 13: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

4.4. Reconfigurable Hardware

13

Hardware side of Cryptography

Page 14: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Reconfigurable Hardware 1/3

Combine characteristics from both software and hardware

Hardware side of Cryptography

14

Page 15: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Reconfigurable Hardware 2/3

Algorithm Agility: switching cryptographic algorithms (SSL, IPSec etc)

Algorithm Upload: Remote connection

Algorithm Modifications: Change parameters

Architecture Efficiency: For specific set of parameters -> efficient hardware

Hardware side of Cryptography

15

Page 16: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Reconfigurable Hardware 3/3

Cryptographic implementations in FPGA devices are in their first stages

Security issues – Side Channel Attacks Timing Attacks Power Analysis Attacks Fault Injection Attacks Noise Analysis Attacks Cache Observation Attacks Electromagnetic Analysis Attacks

Much effort from scientific community to establish a base secure model for cryptosystem designers

Hardware side of Cryptography

16

Page 17: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

5.5. Conclusions

17

Hardware side of Cryptography

Page 18: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

COMPANY LOGO

Conclusions

Large amount of digital info that need to be manipulated in a secure way.

The designer/user must make a tradeoff between performance, cost and security level.

FPGAs and hybrid reconfigurable hardware architectures are ideal for next generation cryptosystems.

Nothing is 100% secure!!!!

Hardware side of Cryptography

18

Page 19: LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

LOGO

Anestis Bechtsoudis

[email protected]

Patra 2010