prince algorithm for industrial iot - directory listing / algorithm for industrial iot a...

18
© 2016 Nokia 1 PRINCE algorithm for Industrial IoT A high-throughput, low-area implementation Johanna Kruse (Wireless Implementation and Trial Systems, Stuttgart, Germany) Dr. Dimitrios Schinianakis (Networks, Analytics, Algorithms, Control and Security, Munich, Germany) 15-06-2017

Upload: ngoanh

Post on 17-May-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia1

PRINCE algorithm for Industrial IoTA high-throughput, low-area implementation

• Johanna Kruse (Wireless Implementation and Trial Systems, Stuttgart, Germany)

• Dr. Dimitrios Schinianakis (Networks, Analytics, Algorithms, Control and Security, Munich, Germany)

• 15-06-2017

Page 2: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia2

Agenda

Nokia Bell Labs

• Motivation

• Use Case for Industrial IoT

• PRINCE algorithm

• Discussion of results

• Further research

Page 3: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia3

Lightweight CryptographyState of the Art

Nokia Bell Labs

• Emerging field of Lightweight Cryptography

• Target: constrained devices

• Single-cycle implementation to decreaselatency

• Problem: low throughput

Maene P., Verbauwhede I. (2016) Single-Cycle Implementations of Block Ciphers. In: Güneysu T., Leander G., Moradi A. (eds) Lightweight Cryptography for Security and Privacy. Lecture Notes in Computer Science, vol 9542. Springer, Cham

Page 4: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia4 Nokia Bell Labs

Use Case for Industrial IoTSecure wireless robot sensor over industrial protocol (Profinet)

5G Base Station

Industrial Network

3rd party robot sensors

Encrypted wireless connection w/ PROFIsafe

Controller(Master, F-Host )

Ethernet link (cabled)

Encrypted wired connection w/ PROFIsafe

IoT GW

5G Base Station

5G Base Station

5G air interface optimized for industrial applications

• Ultra low-latency (4-8ms)

• Large # of devices

• High reliability

• MAC Layer Encryption required (e.g. Profinet/Profisafe)

Unencrypted wired connection

Page 5: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia5

• Adhere to strict budget for security operations

• Ultra high-throughput (multiple device connectivity on the same interface)

• Authentication & integrity protection per message

• Infrequent short-packet transmission – low protocol overhead

Nokia Bell Labs

Use Case for Industrial IoTSecurity perspective

PI North America, “PROFINET, industrial ethernet for advanced manufacturing”, http://us.profinet.com/technology/profinet/, accessed: 2016-09-26.

Page 6: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia6

• 64-bit plaintext/ciphertext

• 128-bit key

• originally single-cycle approach

• focus on low latency

• Hardware-oriented

Nokia Bell Labs

PRINCE algorithmDesign

Page 7: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia7 Nokia Bell Labs

PRINCE algorithmPipelined Implementation

Use of pipelining to increase throughput

Page 8: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia8

PRINCE resultsDiscussion of Results

Nokia Bell Labs

Pipelinestages

Max. frequency

[MHz]

Period[ns]

Latency[ns]

Throughput[Gbit/s]

Area [#LUT]

Area [#FF]

Area [#slices] Mbps/Slice

PRINCE

0 35.7 28 28 2.284 844 128 252 9.06

11 227.273 4.4 48.4 14.545 828 832 267 54.477

• FPGA Implementation: Zynq-7000 (Artix-7, ARM Cortex A9)

Page 9: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia9

PRINCE vs AESDiscussion of Results

Nokia Bell Labs

Pipelinestages

Max. frequency

[MHz]

Period[ns]

Latency[ns]

Throughput[Gbit/s]

Area [#LUT]

Area [#FF]

Area [#slices] Mbps/Slice

PRINCE

0 35.7 28 28 2.284 844 128 252 9.06

11 227.273 4.4 48.4 14.545 828 832 267 54.477

AES

0 25 40 40 3.2 7563 256 2020 1.58

10 178.571 5.6 56 22.85 9511 2242 2816 8.11

Page 10: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia10

Comparison PRINCE - AESDiscussion of Results

Nokia Bell Labs

267

2816

0

500

1000

1500

2000

2500

3000

Area [# slices]

PRINCE AES

48,4

56

44

46

48

50

52

54

56

58

Latency [ns]

PRINCE AES

15

22,85

0

5

10

15

20

25

Throughput [Gbit/s]

PRINCE AES

Page 11: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia11

Further research

Nokia Bell Labs

Authenticated Encryption with Associated Data (AEAD)

• Nonce-based AEAD: never repeating initialization vector across all instances of encryption and all devices in thenetwork under a given key

• Possibility of authentication only without encryption

• Nonce N, plaintext P and associated data A Ciphertext C and authenticated tag T

Header Type Data

PlaintextAssociated data

Nonce(initializationvector)

Typical Ethernet Frame

Page 12: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia12

Summary and Outlook

Nokia Bell Labs

• PRINCE as an efficient ciphering algorithm targeting area-constrained devices

• Capability to support massive machine type communication

• Further research: Authenticated encryption in combination with PRINCE

Page 13: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia13

Sources

Nokia Bell Labs

(1) Borghoff J. et al. (2012) PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications. In: Wang X., SakoK. (eds) Advances in Cryptology – ASIACRYPT 2012. ASIACRYPT 2012. Lecture Notes in Computer Science, vol 7658. Springer, Berlin, Heidelberg

(2) PI North America, “PROFINET, industrial ethernet for advanced manufacturing”, http://us.profinet.com/technology/profinet/, accessed: 2016-09-26.

(3) FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, November 2001.

(4) Maene P., Verbauwhede I. (2016) Single-Cycle Implementations of Block Ciphers. In: Güneysu T., Leander G., Moradi A. (eds) Lightweight Cryptography for Security and Privacy. Lecture Notes in Computer Science, vol 9542. Springer, Cham

(5) Bassham L., Calik C., McKay K., Mouha N. und Turan M. S. , „Profiles for the Lightweight Cryptograohy Standardization Process,“ NIST - National Institute of Standards and Technology, 2017.

(6) Rogaway P., “Evaluation of Some Blockcipher Modes of Operation”, Evaluation carried out for the Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, University of California, 2011

Page 14: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial
Page 15: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial
Page 16: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia16 Nokia Bell Labs

Backup

Page 17: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia17

Copyright and confidentiality

Nokia Bell Labs

The contents of this document are proprietary and confidential property of Nokia. This document is provided subject to confidentiality obligations of the applicable agreement(s).

This document is intended for use of Nokia’s customers and collaborators only for the purpose for which this document is submitted by Nokia. No part of this document may be reproduced or made available to the public or to any third party in any form or means without the prior written permission of Nokia. This document is to be used by properly trained professional personnel. Any use of the contents in this document is limited strictly to the use(s) specifically created in the applicable agreement(s) under which the document is submitted. The user of this document may voluntarily provide suggestions, comments or other feedback to Nokia in respect of the contents of this document ("Feedback").

Such Feedback may be used in Nokia products and related specifications or other documentation. Accordingly, if the user of this document gives Nokia Feedback on the contents of this document, Nokia may freely use, disclose, reproduce, license, distribute and otherwise commercialize the feedback in any Nokia product, technology, service, specification or other documentation.

Nokia operates a policy of ongoing development. Nokia reserves the right to make changes and improvements to any of the products and/or services described in this document or withdraw this document at any time without prior notice.

The contents of this document are provided "as is". Except as required by applicable law, no warranties of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose,

are made in relation to the accuracy, reliability or contents of this document. NOKIA SHALL NOT BE RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS DOCUMENT or for any loss of data or income or any special, incidental, consequential, indirect or direct damages howsoever caused, that might arise from the use of this document or any contents of this document.

This document and the product(s) it describesare protected by copyright according to theapplicable laws.

Nokia is a registered trademark of Nokia Corporation. Other product and company names mentioned herein may be trademarks or trade names of their respective owners.

Page 18: PRINCE algorithm for Industrial IoT - Directory Listing / algorithm for Industrial IoT A high-throughput, low-area implementation • Johanna Kruse (Wireless Implementation and Trial

© 2016 Nokia18

Please delete this slide if document is uncontrolledRevision history and metadata

Nokia Bell Labs

Document ID: DXXXXXXXXXDocument Location:Organization:

Version Description of charges Date Author Owner Status Reviewed by

Revieweddate

Approver Approval date

DD-MM-YYYY DD-MM-YYYY DD-MM-YYYY