Lightweight Cryptography Mission Accomplished? Peter Rombouts ECRYPT II Closing Event Cryptography for 2020 Tenerife January 23 rd , 2013
Organization Lightweight Cryptography: Mission Accomplished? Introduction Technical perspective Business perspective Examples Evaluation Next? PUBLIC 2 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Introduction Why Lightweight Cryptography? RFID tags – Small transponders, command-reply interrogation by a reader – Passively powered by reader field (not always) What if… … cryptography was possible on these devices ? – Applications ? – Technical constraints ? PUBLIC 3 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Introduction Applications Luxury Goods Anti-counterfeiting Privacy Untraceability Perishable Goods Quality monitoring Storage Warranty Certificates PUBLIC 4 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Introduction Technical constraints Cost of RFID tag – RFID market is cost driven – Cost determined by • Area of tag (GE) • Silicon process technology • Assembly Read range – Application specific requirement – Read range determined by • Power consumption • Operating Frequency Transaction time – Application specific requirement – Transaction time determined by • Clock speed & Memory access Robustness against attacks PUBLIC 5 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Algorithms & Implementations 9000 8000 AES (128/128) PRESENT (80/64) 7000 mCrypton (64/64) 6000 Gate Count KATAN (80/32-64) 5000 HIGHT (64/64) 4000 PUFFIN (128/64) 3000 TWINE (80/64) LED (64/64) 2000 KLEIN (80/64) 1000 PICCOLO (80/64) 0 2000 2004 2008 2012 PUBLIC 6 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Algorithms & Implementations 1400 AES (128/128) 1200 Latency (cycles/block) PRESENT (80/64) 1000 mCrypton (64/64) KATAN (80/32-64) 800 HIGHT (64/64) 600 PUFFIN (128/64) TWINE (80/64) 400 LED (64/64) 200 KLEIN (80/64) PICCOLO (80/64) 0 2000 2004 2008 2012 PUBLIC 7 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Algorithms & Implementations 9000 8000 AES (128/128) PRESENT (80/64) 7000 mCrypton (64/64) 6000 Gate Count KATAN (80/32-64) 5000 HIGHT (64/64) 4000 PUFFIN (128/64) 3000 TWINE (80/64) LED (64/64) 2000 KLEIN (80/64) 1000 PICCOLO (80/64) 0 0 250 500 750 1000 1250 Latency (cycles/block) PUBLIC 8 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Standardization: ISO/IEC 29192 ISO/IEC 29192: Information technology – Security techniques – Lightweight cryptography – Part 1: General PUBLISHED • Security requirements, • Classification requirements • Implementation requirements PUBLISHED – Part 2: Block ciphers • PRESENT: block size of 64 bits and a key size of 80 or 128 bits; • CLEFIA: block size of 128 bits and a key size of 128, 192 or 256 bits. PUBLISHED – Part 3: Stream ciphers • Enocoro: key size of 80 or 128 bits; • Trivium: key size of 80 bits. – Part 4: Mechanisms using asymmetric techniques • Under Development PUBLIC 9 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Standardization: EPC Global EPC Gen-2 UHF RFID Protocol REVIEW – For Communications at 860 MHz – 960 MHz – Version 2.0.0 New Commands – Security – Challenge – KeyUpdate – Authenticate – TagPrivilege – AuthComm – ReadBuffer – SecureComm – Untraceable Commands – File Management – FileOpen – FilePrivilege – FileList – FileSetup Mirrored in ISO/IEC 18000-63 PUBLIC 10 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Standardization: EPC Global Interrogator Interrogator Tag Tag (Cryptographic Suite) (Standard) (Standard) (Cryptographic Suite) Air interface & Commands Interrogator processing: Message construction Message – Defined by EPC Authenticate Message Global Message Tag processing: - Message processing - Response construction Response IPReply (Done) Response Cryptographic Response 2 step Interrogator processing: interro- - Response processing functionality gator - Message construction authen- Message tication – Defined by Authenticate Message ISO/IEC 29167 Message Tag processing: IPReply (Busy) - Message processing - Response construction Response IPReply (Done) Response State machine Response – Each standard Interrogator processing: Response processing EPC Air Interface Authentication Protocol / SecureComm PUBLIC 11 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Progress Standardization: ISO/IEC 29167 ISO/IEC 29167 : Information technology – Automatic identification and data capture techniques – Part 1: General PUBLISHED – Part 10: AES-128 (CD) – Part 11: Present 80 (CD) – Part 12: ECC-DH (CD) – Part 13: Grain-128A (WD) – Part 14: AES-OFB (WD) – Part 15: XOR (WD) – Part 16: ECDSA ECDH (CD) – Part 17: Crypto GPS (CD) – Part 1x: HB2 (NWIP) – Part 1x: RAMON (NWIP) PUBLIC 12 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Lightweight Cryptography YES Did it deliver on its promise? NXP UCODE Crypto PRESENT-80 crypto core – ISO 29192-2 compliant – Only Tag Authentication Silicon available Chip size 0.7 mm2 I2C interface 4kb memory Also an ECC version PUBLIC 13 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Lightweight Cryptography YES Did it deliver on its promise? PASTEUR Sensor Platform NXP UCODE I2C Sensor: MIST 1431 (RH, T, light) SEN 300 LPC 1114 Batteries (only for sensor) Single chip solution PUBLIC 14 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Lightweight Cryptography MAYBE Unsolved issues Applications require more than just the crypto core ! Protocol: Randomness Device: Secure Storage Robustness: Countermeasures PUBLIC 15 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Lightweight Cryptography New directions Countermeasures – Currently: add-on – Future: Algorithms designed to be protected Other primitives – Hash, Public Key Low-latency – Lightweight primitives useful for other applications? – Ultra-high speed applications – Some algorithms better than others PUBLIC 16 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Low-Latency Cryptography Applications When response time is critical – Solid state disk – Network – Real time When clock frequency is limited – FPGA Energy efficiency – Wireless sensors – Batteries PUBLIC 17 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Low-Latency Cryptography Evaluation results 400 350 AES (128/128) Gate Count (kGE) 300 PRESENT (80-128/64) 250 mCrypton (64-96-128/64) MINI-AES (64/64) 200 NOEKEON (128/128) 150 LED (64-128/64) 100 KLEIN (80-96-128/64) PRINCE (128/64) 50 0 0 10 20 30 40 50 Latency (ns) PUBLIC 18 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Conclusions Lightweight Cryptography A lot of progress has been made – Algorithms & Implementations – Eco-system: Standards It has been integrated into products – Focus on Tag Authentication – Inclusion of sensors Some unsolved issues New applications emerging – Low-latency Cryptography There is still a lot to be explored ! PUBLIC 19 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
PUBLIC 20 Lightweight Cryptography / ECRYPT II Closing Event / Peter Rombouts January 10, 2013 -
Recommend
More recommend