Click to edit Master title style KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 1 Compact Implementations for RFID and Sensor Nodes L. Batina, K. Sakiyama and.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

LEUCEMIA MIELOIDE AGUDA TIPO 0
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
ZMQS ZMQS
Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Richmond House, Liverpool (1) 26 th January 2004.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
ABC Technology Project
© S Haughton more than 3?
VOORBLAD.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
© 2007 Lawrenceville Press Slide 1 Chapter 3 Margins.
Squares and Square Root WALK. Solve each problem REVIEW:
Energy & Green Urbanism Markku Lappalainen Aalto University.
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
This, that, these, those Number your paper from 1-10.
CRT RSA Algorithm Protected Against Fault Attacks WISTP - 5/10/07 Arnaud BOSCHER Spansion EMEA Robert NACIRI Oberthur Card Systems Emmanuel PROUFF Oberthur.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
A SMALL TRUTH TO MAKE LIFE 100%
1 Unit 1 Kinematics Chapter 1 Day
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Essential Cell Biology
©2004 Brooks/Cole FIGURES FOR CHAPTER 11 LATCHES AND FLIP-FLOPS Click the mouse to move to the next page. Use the ESC key to exit this chapter. This chapter.
How Cells Obtain Energy from Food
Chapter 30 Induction and Inductance In this chapter we will study the following topics: -Faraday’s law of induction -Lenz’s rule -Electric field induced.
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
1 An Elliptic Curve Processor Suitable for RFID-Tags L. Batina 1, J. Guajardo 2, T. Kerins 2, N. Mentens 1, P. Tuyls 2 and I. Verbauwhede 1 Katholieke.
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) 13/10/2006 1/26 Superscalar Coprocessor for High-speed Curve-based Cryptography K.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Presentation transcript:

Click to edit Master title style KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 1 Compact Implementations for RFID and Sensor Nodes L. Batina, K. Sakiyama and I. Verbauwhede Katholieke Universiteit Leuven ESAT-SCD/COSIC DATE 2007 Workshop on Secure Embedded Implementations Nice, France, April 20, 2007

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 2 Outline  Introduction and Motivation  Curve-based Cryptography (ECC/HECC)  Low-cost ECC/HECC processor  Results: area, power, performance  Conclusions  Future work

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 3 Introduction  RFID system and sensors Tags Readers Server

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 4 Motivation  Emerging new applications: wireless applications, sensor networks, RFIDs, car immobilizers, key chains etc. resource limited: area (< 1 mm 2 *), memory, bandwidth resource limited: area (< 1 mm 2 *), memory, bandwidth low-cost, low-power (< 500μW or 1.5 V *), low-energy low-cost, low-power (< 500μW or 1.5 V *), low-energy  Pure hardware solutions are energy and cost effective  Side-channel security  Privacy enhancement * Source: Wolkerstorfer, RFID workshop 2005.

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 5 Motivation: Why Public- Key Cryptography?  PKC reduces protocol overhead => less packet transmissions Example: Schnorr Example: Schnorr identification protocol identification protocol (3 rounds) (3 rounds)  PKC provides more security Key protection Key protection Authentication Authentication Key distribution Key distribution  PKC allows for strong authentication

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 6 ECC/HECC over binary fields A hyperelliptic curve of genus g over a finite field K : A hyperelliptic curve of genus g over a finite field K : f and h are polynomials, deg(h) ≤ g, deg(f)=2g+1 and f is monic some more conditions should be satisfied. An elliptic curve E over GF(2 n ) is defined by an equation of the form: where a, b  GF(2 n ), Points are (x, y) which satisfy the equation, where x, y  GF(2 n ). where a, b  GF(2 n ), Points are (x, y) which satisfy the equation, where x, y  GF(2 n ). A hyperelliptic curve of genus g=1 is called elliptic curve.

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 7 ECC operations: Hierarchy Point Multiplication Point Addition Point Doubling Finite Field Addition Finite Field Multiplication Finite Field Inversion Point Multiplication Point Addition Point Doubling Finite Field Operation E.g. AB or (B+C) mod P Finite Field Inversion (a)(b)  (H)ECC computes point multiplication, kP  (a) conventional hierarchy  (b) Compact datapath architecture Controller Datapath

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 8 Low-power design  Architectural decisions are important  Frequency as low as possible  Power consumption and energy efficiency are both crucial  ECC arithmetic should be revisited to optimize those parameters  The circuit size should be minimized  Flexibility can be sacrificed

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 9 (H)ECC processor HECC (83 bits) ECC-comp. (83 bits)

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 10 New compact MALU (Modular ALU)  Implements bit/digit serial modular multiplication and addition in a binary field  Fixed irreducible polynomial  Suitable for ECC over GF(2 p ), ECC over composite fields and HECC  Resource sharing of both modular operations required  No separate squaring unit or inverter => simple side-channel resistance

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 11  AB mod N (cmd = 1) & B +C mod N (cmd = 0) Schematics of the MALU d: digit size n: field size

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 12 Area of MALU for ECC/HECC  ECC: d = 1,…, 4; k = 131,…, 163  ECC comp. & HECC: d = 1,…, 8, k = 67,…, 83 ECC ECC-comp. / HECC

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 13 ECC results for area: MALU + controller d = 1 d = 2 d = 3 d = 4 k = k = k = k = Control is around 30% of the total # of gates

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 14 ECC-comp. and HECC results for area: MALU + controller d = 1 d = 2 d = 4 d = 6 d = 8 k = 67 ECC-comp.HECC k = 83 ECC-comp.HECC

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 15 Results: Power consumption by MALU ECC (163 bits) ECC-comp (83 bits)  ECC: d = 1,…, 4; k = 163  ECC comp. : d = 1,…, 8; k = 83

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 16 Results for ECC: performance  Estimated performance for ECC over GF(2 p ), 1 point 500 kHz (digit size d = 4 ): (digit size d = 4 ): t = 190 ms in GF(2 163 ) t = 190 ms in GF(2 163 ) t = 115 ms in GF(2 131 ) t = 115 ms in GF(2 131 )

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 17 Complete results PKC – bits of sec. d # gates w/o RAM f [kHz] t [ms] P [μW] ECC < 12 ECC < 15 ECC-comp < 13 HECC < 17

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 18 Conclusions  The presented MALU is the smallest possible solution for curve-based cryptography  Our result is also the most compact ECC/HECC solution so far  Area and power are scalable in the digit size, d

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 19 Future work  Better power estimates regarding RAM and synthesis in 0.13 (0.18)  m CMOS library are required  Compact RNG for tag authentication protocol  Light-weight protocols: trade-off between security and efficiency  Low-cost countermeasures for side- channel attacks

KATHOLIEKE UNIVERSITEIT LEUVEN | COSIC 20 Further reading 1. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Public-Key Cryptography on the Top of a Needle", In Proc. of IEEE International Symposium on Circuits and Systems (ISCAS 2007), May 27-30, 2007, New Orleans, to appear. 2. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Low-cost Elliptic Curve Cryptography for wireless sensor networks", In Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, LNCS 4357, Springer-Verlag, pp. 6-17, Sep , 2006, Hamburg, Germany. 3. K. Sakiyama, L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, "Small-footprint ALU for public-key processors for pervasive security," In Workshop on RFID Security 2006, July 12-14, 2006, Graz, Austria.