Lightweight Cryptography for IoT

Slides:



Advertisements
Similar presentations
Lecture 5: Cryptographic Hashes
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Click Here to Begin. Objectives Purchasing a PC can be a difficult process full of complex questions. This Computer Based Training Module will walk you.
Information Technology
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 Software Testing and Quality Assurance Lecture 40 – Software Quality Assurance.
Geneva, Switzerland, September 2014 Lightweight Cryptography for the Connected Car/ITS Security Shiho Moriai Director, Security Fundamentals Laboratory,
Computing Hardware Starter.
Chapter 20 Symmetric Encryption and Message Confidentiality.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
Azam Supervisor : Prof. Raj Jain
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Part 3 Ms. T. N. Jones1. Vocabulary 1. A design for health, safety, and comfort 2. A tool used to put data into a computer, such as a keyboard, mouse,
Future Internet: Sensor Networks Security Yongkoo Han.
CPU Central Processing Unit
Unit 2 Technology Systems
Computer Hardware and Software
IoT Milos Hampl.
ITU/TTC Workshop ( ) How Communications will Change Vehicle and Transport The Potential of Lightweight Cryptography to Secure Resource-Constrained.
What is a Firewall?.
Computer Science 2 What’s this course all about?
Lesson Objectives Aims To understand the purpose of embedded systems
Introduction to Computer
Provides Confidentiality
INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.
Computational Thinking, Problem-solving and Programming: General Principals IB Computer Science.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
CSCI-235 Micro-Computer Applications
6. Structure of Computers
INTRODUCTION TO COMPUTERS
Computer Hardware and Software
Microcontroller Based Digital Code Lock
Prepared by: Celeste Ng Updated: May, 2017.
Everything as a service
Understanding the OSI Reference Model
Internet of Things.
Introduction to Computing
Presented by: Dr. Munam Ali Shah
Cryptography after DES
Internet of Things (IoT)
Cryptography Lecture 18.
RFID Security Tony Arous Vincent Yu.
Security Of Wireless Sensor Networks
Cloud computing mechanisms
Introduction to computers
January 16, 2019 doc.: IEEE r0 September, 2004
Section 2: Cryptography
2.C Memory GCSE Computing Langley Park School for Boys.
Computer Basics PE 266 Dr. Mike Butler.
Block Ciphers (Crypto 2)
Security of Wireless Sensor Networks
International Data Encryption Algorithm
CHAPTER 1 THE 8051 MICROCONTROLLERS
Hashing Hash are the auxiliary values that are used in cryptography.
Cryptography Lecture 17.
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Hash Function Requirements
Counter Mode, Output Feedback Mode
Feistel Cipher Structure
Everyone Wants to Zoom!.
Lecture 36.
Blowfish Encryption Algorithm
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Lecture 36.
Martin Croome VP Business Development GreenWaves Technologies.
Presentation transcript:

Lightweight Cryptography for IoT by Yosi Hendarsjah

What is Internet of Things? It’s basically collection of devices that are connected to the Internet and communicate with other devices. The term was coined by Kevin Ashton in 1999. A Coke vending machine at Carnegie Mellon U. is considered as the first IoT device (1982).

IoT Applications Smart Homes Wearables Retail Smart Cities Healthcare Transportation Industry

Why Lightweight Cryptography Typical IoT devices are resource-constrained. They generally have lower computational power, smaller memory size, lower power consumption, smaller physical size, lower price than full-fledged devices such as PCs, laptops, or tablets. We need cryptography algorithms that have small footprints and consume low power without sacrificing security.

ISO/IEC 29192 Is about standards on lightweight cryptography. Lightweight cryptography is classified by a combination of the constraints on chip area, energy consumption, program code and RAM size, communication bandwidth, and execution time. Defines 80 bits security as the minimum security strength for lightweight cryptography. Specifies a number of block ciphers, stream ciphers, and hash functions as standards. Not yet completed. Work still in progress for standards on MAC.

Block Ciphers Block ciphers specified by ISO/IEC 29192: PRESENT: 64 bits block size and 80 or 128 bits key size CLEFIA: 128 bits block size and 128, 192, and 256 bits key size SIMON: 48 – 128 bits block size, 96 – 256 bits key size SPECK: 48 – 128 bits block size, 96 – 256 bits key size

PRESENT Block Cipher Designed for some very specific applications for which AES is unsuitable. Designed to conform these characteristics: To be implemented on hardware For applications that only need moderate security level For applications that unlikely to encrypt large amount of data Where physical size, power consumption, and execution time are the primary concerns (after security). For some applications it is possible that the key will be fixed at the time when the device is manufactured. For some applications the cipher will be used to perform encryption only. Hardware implementation of PRESENT has much higher throughput and requires a half of gates compared to the implementation of AES with similar key size.

SIMON and SPECK Block Ciphers Flexible secure block ciphers, can perform well on any platform. 64-256 bits key size, 32-128 bits block size SIMON is more hardware oriented, SPECK is more software oriented. Hardware implementation requires less gates than other algorithms.

Stream Ciphers ISO/IEC 29192 specifies two stream ciphers: Enocoro: 80 or 128 bits key size Trivium: 80 bits key size Both of them are hardware oriented. The literatures do not really explain much about why these algorithms are considered ‘lightweight’ and do not compare them to other algorithms.

Hash Functions ISO/IEC 29192 specifies three hash functions: PHOTON: permutation size 100-288 bits and output size 80-256 bits SPONGENT: permutation size 88-272 bits and output size 88-256 bits Lesamnta-LW: permutation size 384 bits and outputs size 256 bits

SPONGENT Hash Function Five different hash sizes: 88, 128, 160, 224, 256 Three types pre-image and second pre-image security level: Full pre-image and second pre-image security level Reduced second pre-image security level Reduced pre-image and second pre-image security level

Lesamnta-LW Hash Function Lightweight 256 bits hash function Has collision, pre-image, and second pre-image security level of at least 2120. Hardware implementation only requires 8240 gates. Software implementation only requires 50 bytes of RAM and runs fast on short messages on 8-bit CPUs.

Comparison Cryptography algorithms designed for IoT are ‘lightweight’ because: Designed specifically for constrained devices such as RFID tags and networked sensors (hardware oriented). Have several security levels that are sufficient to different types of applications. Designed to process only small amount of data. Existing popular cryptography algorithms are ‘heavy’ because: Designed as general-purpose algorithms. Generally software-oriented. High security level. Can process large amount of data.

The End Questions?