Cryptanalysis on FPGA Based Hardware

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

International Data Encryption Algorithm
Lecture 5: Cryptographic Hashes
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography and Network Security Chapter 3
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Zheming CSCE715.  A wireless sensor network (WSN) ◦ Spatially distributed sensors to monitor physical or environmental conditions, and to cooperatively.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Hellman’s TMTO 1 Hellman’s TMTO Attack. Hellman’s TMTO 2 Popcnt  Before we consider Hellman’s attack, consider simpler Time-Memory Trade-Off  “Population.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
(TPDS) A Scalable and Modular Architecture for High-Performance Packet Classification Authors: Thilan Ganegedara, Weirong Jiang, and Viktor K. Prasanna.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Swankoski MAPLD 2005 / B103 1 Dynamic High-Performance Multi-Mode Architectures for AES Encryption Eric Swankoski Naval Research Lab Vijay Narayanan Penn.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Chapter 11 Message Authentication and Hash Functions.
Lecture 23 Symmetric Encryption
Cracking the DES Encryption
Information Assurance Management Cryptographic Techniques Week 12-2.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Intro to Cryptography Lesson Introduction
Data Encryption Standard (DES)
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Linear Cryptanalysis of DES
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
DES: Data Encryption Standard
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
ECE 545 Project 1 Introduction & Specification Part I.
Optimizing Packet Lookup in Time and Space on FPGA Author: Thilan Ganegedara, Viktor Prasanna Publisher: FPL 2012 Presenter: Chun-Sheng Hsueh Date: 2012/11/28.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography after DES
Cryptography and Cryptanalysis
International Data Encryption Algorithm
Presentation transcript:

Cryptanalysis on FPGA Based Hardware Malcolm Alda Sumantri Bachelors of Engineering (Software) & Bachelors of Commerce (Finance) Supervisors: Matt Barrie Craig Jin The University of Sydney

Introduction Welcome to the Digital Age where everything can be replicated! Cryptography is used… To protect our privacy For example: our real identity, our e-mails to family and friends, our digital photos, our work. To protect corporate secrets For example: future corporate strategies, intellectual property, pricing information, human resources information. By governments For example: sending messages to spies, task forces, between agencies to protect civilians and against terrorism. How secure are our currently deployed cryptosystems?

Motivation Information security is a resource game. More funds means more access to information. The US National Security Agency’s annual budget is classified but is said to be over US $13 billion. Assessing the strength of our cryptosystems therefore involves determining the cost to break them. Rapid development in Field Programmable Gate Array Technology (FPGA) technology that makes it cheaper to develop high-performance custom hardware systems. FPGA technology has proven to be effective for cryptographic use. A recent optimization in cryptanalysis. Rainbow Tables

Background Symmetric Cipher Cryptanalysis: Code breaking, reveal the plaintext without the key. Exhaustive Key Search: Try every key possible, requires large computational power. Table Lookup: Store keys and ciphertexts in a massive tables to perform a lookup when trying to attack, requires a large amount of memory (infeasible). Time-memory trade-off: Give up memory to achieve a faster attack time. FPGAs Reconfigurable logic (upload the bitstream to the hardware). Cheaper than Application Specific Integrated Circuits (ASICs) for small volumes.

Time-Memory Trade-Off: Rainbow Tables How does it work? Assume a chosen-plaintext attack scenario. The attacker can choose which plaintext to access. This attacker will use this to attack the cryptosystem. This is practical in the real-world (UNIX password hashing, “#include <stdio.h>”, “\n”) Two Phases Precomputation Phase Online Attack Phase (Cryptanalytic Attack) Precomputation Phase: Generate a rainbow table. A rainbow table is a two-column table (start-point, end-point) These points are possible keys. This table is generated by a specific algorithm. Online Attack Phase: Use the rainbow table. We are given a ciphertext to break. Now we perform a search on the rainbow table by using another algorithm This method is probabilistic, but faster than exhaustive key search. Unlike exhaustive key search that only requires computational resources (processor). This method uses memory as well as computational resources. As a result, the attack time is faster but we have given up memory. This is the trade-off.

Methodology Design and implement an FPGA based cryptanalytic system that uses the rainbow tables method of cryptanalysis. Use the Data Encryption Standard (DES) as the test symmetric cipher. DES uses a 56-bit key. DES is the most widely studied cipher. DES is still used today (UNIX password hashing). Determine the cost to break DES. Extrapolate the cost to break other ciphers.

Design I – Data Encryption Standard In designing a cryptanalytic system, the performance of the cipher module will determine the performance. Security of DES derives from 16 rounds of permutations, substitutions and xoring. Each round is implemented as a 3-stage pipeline. A total of 48-stages for the 16 rounds of DES. Pipelining improves performance: Attain higher clock frequencies. Achieve parallelization: 48 encryptions per clock cycle.

Design II – The Rainbow Table Precomputation System 1. High Level System Design 2. Hardware Design 3. Hardware output behavior (Timing Diagram)

Design III – The Rainbow Table Online Attack System 1. High Level System Design 2. Hardware Design 3. Mechanism Step Goal Tool Input to Tool Output of Tool 1 Generate end-points from the chosen plaintext/ciphertext pair. End-Point Generator (Hardware) Chosen plaintext, chosen ciphertext, start mark, end-mask Prospective End-Point, Prospective Column Number 2 Perform table lookup on all end-points generated from Step 1. Online Attack Software Application End-Points generated from Step 1. Start Points that corresponds with matching end-points from Step 1. 3 Generate Key from Starting Points found in Step 2. Intermediate Key Generator (Hardware) Start-Point and matching column number (from Steps 1 and 2), start-mask, end-mask. Candidate Key(s) 4 Test validity of Key Candidate key(s) from Step 3, chosen plaintext, chosen ciphertext. Key

Experiment and Results Cryptanalytic attack on 40-bit DES since the resources to break DES is out-of-reach for the budget in this thesis. Use Sensory NetworksTM NodalCoreTM C-1000 PCI Card. Xilinx® Virtex-II Pro VP-40 FPGA Flexible chipset architecture to embed our hardware engines. PCI interface allows for high-speed communications. Results 40-bit DES Rainbow Table can be generated in less than 4 hours. Table parameters allows for 85% cryptanalytic success probability. Fastest known implementation in the literature based on results. Online attack of 40-bit DES in 30.8 seconds.

Data Analysis Performance-Cost Analysis Determine the FPGA chip that provides the highest performance for the lowest cost. Synthesized the hardware designs for various Xilinx FPGAs. Spartan 3 S-1500 provides the highest performance-cost relative to other Xilinx® FPGA chips. Extrapolate the design of a machine to break DES (56-bit key length) Result: DES can be broken with 85% success probability in 72 minutes for an approximate cost of US $1,210. Performance-Cost of Precomputation Hardware System

Conclusion FPGAs provides a low cost and effective solution to cryptanalysis. Rainbow table attacks provide a faster attack time compared to brute-force, but brute-force uses less resources, that is, memory resources. For large key sizes, the rainbow table attack becomes infeasible as memory costs is prohibitive. Potential Attacker Key Length (bits) Cost (US $) Clever Outsider 56 353 58 1,413 60 5,650 Knowledgeable Insiders 62 22,600 64 90,400 Funded Organization (Large Corporation, Mafia) 66 361,601 68 1.4 million (Small Government, Terrorist Networks) 72 24 million 76 370 million 78 1.5 billion (Large Government Bodies: US National Security Agency) 80 6 billion 82 24.7 billion 84 94.8 billion 86 380 billion 88 1.5 trillion Not feasible 92 242 trillion