logo hardware side of cryptography anestis bechtsoudis [email protected] patra 2010
TRANSCRIPT
COMPANY LOGO
Hardware side of Cryptography
Contents
Introduction1
Cryptography2
Software vs. Hardware3
Reconfigurable Hardware4
Conclusions5
2
COMPANY LOGO
1.1. Introduction
3
Hardware side of Cryptography
COMPANY LOGO
Introduction 1/2
Shift to embedded & special purpose devices
Increase of electronic transactions & eCommerce
Large amount (soon bigger) of sensitive data transferred through insecure communication channels
Hardware side of Cryptography
4
COMPANY LOGO
Introduction 2/2
Imperative need to work under a secure model Prevent unauthorized access Warranty authenticity and integrity Protect privacy
Application specific security level
Software, hardware and smart card cryptographic solutions
Hardware side of Cryptography
5
COMPANY LOGO
2.2. Cryptography
6
Hardware side of Cryptography
COMPANY LOGO
Cryptography 1/3
Cryptographic algoritmhs classes Secret/Symmetric key ciphers (DES, AES,
IDEA, Cast128, Camellia) Public/Assymetric key ciphers (RSA, ECC) Hash functions (MD5, SHA2, Whirlpool)
Modern ciphers designed to achieve high throughputs through high parallelism in hardware.
Hardware side of Cryptography
7
COMPANY LOGO
Cryptography 2/3
Advantages of secret key ciphers higher rates of data throughput compared to
public ciphers hardware implementations achieve encrypt rates
of hundreds of megabytes per second software implementations achieve throughput
rates of megabytes per second much less computationally intensive than public
key algorithm
Hardware side of Cryptography
8
COMPANY LOGO
Cryptography 3/3
Secret key ciphers operations bit shuffling (permutation) simple non-linear functions implemented as
lookup tables (S-Boxes) linear mixing (modulo) using XOR networks
Public key ciphers operations modular addition/subtraction modular multiplication-exponentiation variable length rotation
Hardware side of Cryptography
9
COMPANY LOGO
3.3. Hardware vs. Software
10
Hardware side of Cryptography
VS.
COMPANY LOGO
Hardware vs. Software 1/2
Software+ Ease of use+ Ease of upgrade+ Portability+ Low development costs+ Flexibility- Low speed- High power consumption- Limited security
CryptographicImplementations
Hardware+ Low prices per unit+ High speeds+ Low power consumption+ High parallelism level+ High level security- High development costs- Lack of flexibility
! What about reconfigurable hardware?
Hardware side of Cryptography
11
COMPANY LOGO
Hardware vs. Software 2/2
Crypto -Crypto -SystemSystem
CostCost
PerformancePerformance
SecuritySecurity
12
Hardware side of Cryptography
COMPANY LOGO
4.4. Reconfigurable Hardware
13
Hardware side of Cryptography
COMPANY LOGO
Reconfigurable Hardware 1/3
Combine characteristics from both software and hardware
Hardware side of Cryptography
14
COMPANY LOGO
Reconfigurable Hardware 2/3
Algorithm Agility: switching cryptographic algorithms (SSL, IPSec etc)
Algorithm Upload: Remote connection
Algorithm Modifications: Change parameters
Architecture Efficiency: For specific set of parameters -> efficient hardware
Hardware side of Cryptography
15
COMPANY LOGO
Reconfigurable Hardware 3/3
Cryptographic implementations in FPGA devices are in their first stages
Security issues – Side Channel Attacks Timing Attacks Power Analysis Attacks Fault Injection Attacks Noise Analysis Attacks Cache Observation Attacks Electromagnetic Analysis Attacks
Much effort from scientific community to establish a base secure model for cryptosystem designers
Hardware side of Cryptography
16
COMPANY LOGO
5.5. Conclusions
17
Hardware side of Cryptography
COMPANY LOGO
Conclusions
Large amount of digital info that need to be manipulated in a secure way.
The designer/user must make a tradeoff between performance, cost and security level.
FPGAs and hybrid reconfigurable hardware architectures are ideal for next generation cryptosystems.
Nothing is 100% secure!!!!
Hardware side of Cryptography
18