lightweight cryptography and classification of aead modes
play

Lightweight Cryptography and Classification of AEAD Modes Nilanjan - PowerPoint PPT Presentation

Lightweight Cryptography and Classification of AEAD Modes Nilanjan Datta Institute for Advancing Intelligence (IAI), TCG CREST International Crypto-Webniar 2020 Aug 30, 2020 N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of


  1. Lightweight Cryptography and Classification of AEAD Modes Nilanjan Datta Institute for Advancing Intelligence (IAI), TCG CREST International Crypto-Webniar 2020 Aug 30, 2020 N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 1 / 70

  2. Content Introduction to Authenticated Encryption Motivation of Lightweight Cryptography A Discussion on NIST LwC Project Classification of lightweight AEAD Modes N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 2 / 70

  3. I: An Introduction to Authenticated Encryption N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 3 / 70

  4. The Popular Story: Encryption 1 Alice and Bob share a secret key K N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 4 / 70

  5. The Popular Story: Encryption 1 Alice and Bob share a secret key K 2 Alice sends the ciphertext C = Enc K ( M ) corresponding to a message M to Bob N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 4 / 70

  6. The Popular Story: Encryption 1 Alice and Bob share a secret key K 2 Alice sends the ciphertext C = Enc K ( M ) corresponding to a message M to Bob 3 Data Privacy: Only Bob can decrypt. No information (other than length) about plaintext is leaked from ciphertext N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 4 / 70

  7. The Popular Story: Encryption Enc K (“My Netflix password is nil123”)

  8. The Popular Story: Encryption Decrypts: Read Message Enc K (“My Netflix password is nil123”) N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 5 / 70

  9. The Popular Story: Authentication 1 Alice and Bob share a secret key K N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 6 / 70

  10. The Popular Story: Authentication 1 Alice and Bob share a secret key K 2 Alice sends M along with tag T = Tag K ( M ) to Bob N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 6 / 70

  11. The Popular Story: Authentication 1 Alice and Bob share a secret key K 2 Alice sends M along with tag T = Tag K ( M ) to Bob 3 Data Integrity: Bob can verify valid tag and can reject all tampered tag N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 6 / 70

  12. The Popular Story: Authentication “I love you” � Tag K (“I love you”)

  13. The Popular Story: Authentication Valid Tag: Read Message “I love you” � Tag K (“I love you”) N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 7 / 70

  14. The Popular Story: Authentication “ I h a t e y o u ” � T “I love you” � Tag K (“I love you”)

  15. The Popular Story: Authentication Invalid Tag: Ignore Message. “I hate you” � T “I love you” � Tag K (“I love you”) N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 8 / 70

  16. Authenticated Encryption Authentication + Encryption N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 9 / 70

  17. Why Authenticated Encryption? Chasing the Gangstar Inspector Alice wishes sub-inspector Bob to move his check point to a different location N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 10 / 70

  18. Why Authenticated Encryption? Chasing the Gangstar Inspector Alice wishes sub-inspector Bob to move his check point to a different location Data Privacy : The updated check point should remain confidential N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 10 / 70

  19. Why Authenticated Encryption? Chasing the Gangstar Inspector Alice wishes sub-inspector Bob to move his check point to a different location Data Privacy : The updated check point should remain confidential Data Authenticity : Alice sends the updated check point and it has not been modified in transit N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 10 / 70

  20. Why Authenticated Encryption? Covid Report Doctor Alice wishes to send the covid report M of Bob to the medical database N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 11 / 70

  21. Why Authenticated Encryption? Covid Report Doctor Alice wishes to send the covid report M of Bob to the medical database Data Privacy : Bob’s medical records should remain confidential N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 11 / 70

  22. Why Authenticated Encryption? Covid Report Doctor Alice wishes to send the covid report M of Bob to the medical database Data Privacy : Bob’s medical records should remain confidential Data Authenticity : Alice prepares the report and the report was not modified in transit N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 11 / 70

  23. Why Authenticated Encryption? The Annual Evaluation Prof. Alice wishes to inform the semestral marks to her students Data Privacy : Bob’s marks should remain confidential Data Authenticity : Alice sends the marks and the marks have not been modified in transit N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 12 / 70

  24. Authenticated Encryption with Associated Data (AEAD) AEAD Algorithm AE ( K , AD , M , N ) → ( C , T ) N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 13 / 70

  25. Authenticated Encryption with Associated Data (AEAD) AEAD Algorithm AE ( K , AD , M , N ) → ( C , T ) What is Associated Data? Header of the Message. Example: IP Address Requires data authenticity, not privacy N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 13 / 70

  26. Authenticated Encryption with Associated Data (AEAD) AEAD Algorithm AE ( K , AD , M , N ) → ( C , T ) What is Associated Data? Header of the Message. Example: IP Address Requires data authenticity, not privacy What is Nonce? An arbitrary number used only once . Example: Counter Used to generate randomness N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 13 / 70

  27. Authenticated Encryption with Associated Data (AEAD) Verified Decryption Algorithm VD ( K , AD , C , T , N ) → M / ⊥ . N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 14 / 70

  28. Authenticated Encryption with Associated Data (AEAD) Verified Decryption Algorithm VD ( K , AD , C , T , N ) → M / ⊥ . A Note on Verified Decryption Plaintext is only released after verification is successful Otherwise, the algorithm aborts However, the ordering of verification and decryption may vary N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 14 / 70

  29. II: An Introduction to Light-weight Cryptography N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 15 / 70

  30. Lightweight Cryptography: Use in Rain RFID Tags N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 16 / 70

  31. Lightweight Cryptography: Use in Vehicles N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 17 / 70

  32. Lightweight Cryptography: Use in Smart Home N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 18 / 70

  33. Lightweight Cryptography: Use in Medical Sensors N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 19 / 70

  34. What is Lightweight Cryptography? Lightweight Cryptography Subfield of Cryptography that aims to provide crypto solutions tailored to constrained environments N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 20 / 70

  35. What is Lightweight Cryptography? Lightweight Cryptography Subfield of Cryptography that aims to provide crypto solutions tailored to constrained environments Lightweight = Light + Weight N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 20 / 70

  36. What is Lightweight Cryptography? Lightweight Cryptography Subfield of Cryptography that aims to provide crypto solutions tailored to constrained environments Lightweight = Light + Weight Weight of an Algorithm A property of its implementation depending on different metrics of the target platform N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 20 / 70

  37. Weight of An Algorithm N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 21 / 70

  38. Weight of An Algorithm N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 22 / 70

  39. Weight of An Algorithm N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 23 / 70

  40. Weight of An Algorithm N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 24 / 70

  41. Weight of An Algorithm N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 25 / 70

  42. General Purpose Crypto vs Lightweight Crypto General Purpose Crypto Used in several applications A proper trade-off of various metric: area, speed, throughput, energy etc Lightweight Crypto Used for dedicated resource constraint environment Lack of Crypto standards suitable for such devices. N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 26 / 70

  43. NIST LwC Project III: A Brief Overview on NIST LwC Project N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of AEAD 27 / 70

Recommend


More recommend