Survey of Crypto CoProcessor Design

Slides:



Advertisements
Similar presentations
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
Advertisements

14. Aug Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware SAC 2013, Burnaby, Canada Thomas Pöppelmann and Tim Güneysu.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Digital Signatures and Hash Functions. Digital Signatures.
Zheming CSCE715.  A wireless sensor network (WSN) ◦ Spatially distributed sensors to monitor physical or environmental conditions, and to cooperatively.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Design of a Reconfigurable Hardware For Efficient Implementation of Secret Key and Public Key Cryptography.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Study of AES Encryption/Decription Optimizations Nathan Windels.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Some Perspectives on Smart Card Cryptography
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Potential vulnerabilities of IPsec-based VPN
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Cryptographic Hash Functions
Lecture 9 Overview. RSA Invented by Cocks (GCHQ), independently, by Rivest, Shamir and Adleman (MIT) Two keys e and d used for Encryption and Decryption.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
High-Speed Architectures of the Cryptographic Hash Function BLAKE E.Umashankar, , M.E,VLSI Design Guide By Ms.M.Saroshree,A.P,ECE.
Web Applications Security Cryptography 1
Design and Analysis of Low-Power novel implementation of encryption standard algorithm by hybrid method using SHA3 and parallel AES.
Attacks on Public Key Encryption Algorithms
Security Outline Encryption Algorithms Authentication Protocols
Overview on Hardware Security
Cryptanalysis using Supercomputers, FPGAs and GPUs
Symmetric and Asymmetric Encryption
Symmetric Cryptography
Home: Tel: , H.P.: Office: 공) 7710A
Cryptography Why Cryptography Symmetric Encryption
Cryptographic Hash Function
B. R. Chandavarkar CSE Dept., NITK Surathkal
Hardware Cryptographic Coprocessor
Security.
Outline Desirable characteristics of ciphers Uses of cryptography
Basic Network Encryption
Outline Desirable characteristics of ciphers Uses of cryptography
Digital Signatures Last Updated: Oct 14, 2017.
Efficient CRT-Based RSA Cryptosystems
ICS 454 Principles of Cryptography
Message-Digest 5 (MD5) Hash Reversal System
Asymmetric Cryptography
Security through Encryption
Cryptography Lecture 24.
Security in Network Communications
Introduction to Symmetric-key and Public-key Cryptography
Protect Your Hardware from Hacking and Theft
Security.
The Secure Sockets Layer (SSL) Protocol
ICS 454 Principles of Cryptography
What I’ve done in the past 6 months
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Basic Network Encryption
Hashing Hash are the auxiliary values that are used in cryptography.
Cryptography Fundamentals
Presentation transcript:

Survey of Crypto CoProcessor Design Shah Zafrani CS 6021 – Fall ’17

Cryptography Basics There are two main types of commonly Cryptographic Algorithms : Symmetric Key AES is the most commonly used form of this because of it’s speed Better for encrypting messages Asymmetric Key RSA is used because of it’s ability to securely exchange keys Used for key exchange primarily Not ideal for message encryption because it’s computationally heavy We’re going to be focusing on Symmetric Key

Hash Algorithms are crucial too! Hashing algorithms are used to authenticate data. MD5 Checksums, SHA-1, and SHA-256 are just a few. Some Crypto CoProcessors also speed up these algorithms

FPGA vs ASIC ASIC (Application Specific Integrated Chip) More Power Efficient Takes longer to design Relatively difficult to modify FPGA (Field Programmable Gate Array) Short design cycle enables quick time-to-market Low cost Easy to update and modify

FPGA based CoProcessor This is an implementation that is coupled with a MIPS Processor but can be extended to others All instructions fetched by the main processor that are not designed for it are sent to the FPGA. CoProcessor is Parameterized so that only as many rounds as needed are processed Designed specifically for AES

AES implementation Completes rounds iteratively

Pipelined AES Implementation Takes advantage of parallelization to allow multiple rounds to run concurrently

MIPS Datapath

MIPS with AES CoProcessor

AFPC Implementation Application Flexible coProcessor for Crypto CMOS 0.18um fabrication Uses VLIW (Very Long Instruction Word) 160 bits wide 32 bits for op code, and 128/4 bits for up to four functional units Allows for AES, DES, MD5, SHA, and others Application Flexible coProcessor for Crypto information

Overview of AFPC

Functional Unit Details

SRCP Implementation ASIC CMOS produced solution Resistant to Side Channel Attacks Simple Power Analysis Differential Power Analysis Electromagnetic Analysis Supports AES, DES, IDEA, RC6 Reconfigurable using PE Arrays Secure Reconfigurable Crypto CoProcessor Complementary metal–oxide–semiconductor PE: Processing Element

SRCP Overview

Scan Channel Analysis Visualized

References (APA Style) Parameterized AES-Based Crypto Processor for FPGAs. (2014). 2014 17th Euromicro Conference on Digital System Design, Digital System Design (DSD), 2014 17th Euromicro Conference on, Digital System Design (DSD), 2013 Euromicro Conference on, 465. doi:10.1109/DSD.2014.90 Yang, X., Yu, X., Dai, Z., & Zhang, Y. (2008). Accelerated flexible co-processor architecture for crypto information. *2008 4Th IEEE International Conference On Circuits And Systems For Communications, ICCSC*, (2008 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC), 628-632. doi:10.1109/ICCSC.2008.139 Shan, W., Fu, X., & Xu, Z. (2015). A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA. IEEE Transactions On Computer-Aided Design Of Integrated Circuits & Systems, 34(7), 1201-1205.