Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Idongesit Ebong (1-1) Jenna Fu (1-2) Bowei Gai (1-3) Syed Hussain (1-4) Jonathan Lee (1-5) Design Manager: Myron Kwai Overall Project Objective: Design.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
Idongesit Ebong (1-1) Jenna Fu (1-2) Bowei Gai (1-3) Syed Hussain (1-4) Jonathan Lee (1-5) Design Manager: Myron Kwai Overall Project Objective: Design.
Idongesit Ebong (1-1) Jenna Fu (1-2) Bowei Gai (1-3) Syed Hussain (1-4) Jonathan Lee (1-5) Design Manager: Myron Kwai Overall Project Objective: Design.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage VI: February 25 h 2004.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 3: Feb. 4 th Size Estimates/Floorplan Overall Project Objective: Design an.
Viterbi Decoder: Presentation #11 M1 Overall Project Objective: Design a high speed Viterbi Decoder Stage 11: 12 th April 2004 Short Final Presentation.
Huffman Encoder Project. Howd - Zur Hung Eric Lai Wei Jie Lee Yu - Chiang Lee Design Manager: Jonathan P. Lee Huffman Encoder Project Final Presentation.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 10: April 5th Chip Level Simulation Overall Project Objective: Design an.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 11: April 12th Short Final Presentation Overall Project Objective: Design.
1 Team M1 Enigma Machine 3rd May, 2006 Adithya Attawar (M11) Shilpi Chakrabarti (M12) Mike Sokolsky (M14) Design Manager: Prateek Goenka Adithya Attawar.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage IX: March 30 th 2004.
[M2] Traffic Control Group 2 Chun Han Chen Timothy Kwan Tom Bolds Shang Yi Lin Manager Randal Hong Wed. Oct. 27 Overall Project Objective : Dynamic Control.
E-Voting Machine - Design Presentation Group M1 Bohyun Jessica Kim Jonathan Chiang Chi Ho Yoon Donald Cober Mon. Sept 29 System Hardware Component Diagram.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 9: March 31st Chip Level Simulatio Overall Project Objective: Design an Air-Fuel.
M2: Team Paradigm :: Pre-Final Presentation 2-D Discrete Cosine Transform Team Paradigm (Group M2): Tommy Taylor Brandon Hsiung Changshi Xiao Bongkwan.
E-Voting Machine - Design Presentation Group M1 Bohyun Jessica Kim Jonathan Chiang Chi Ho Yoon Donald Cober Mon Oct 6 th Floorplan again Structural Verilog.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Idongesit Ebong (1-1) Jenna Fu (1-2) Bowei Gai (1-3) Syed Hussain (1-4) Jonathan Lee (1-5) Design Manager: Myron Kwai Overall Project Objective: Design.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage VII: March 1 st 2004.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage III: February 11 h 2004.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage VIII: March 24 th 2004.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 8: March 24th Chip Level Layout Overall Project Objective: Design an Air-Fuel.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
E-Voting Machine - Design Presentation Group M1 Bohyun Jessica Kim Jonathan Chiang Chi Ho Yoon Donald Cober Mon, Nov 10 Functional Layout Blocks Floor.
E-Voting Machine - Design Presentation Group M1 Bohyun Jessica Kim Jonathan Chiang Chi Ho Yoon Donald Cober Mon, Nov 10 Analog Simulation for ExtractedRC.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 5: Feb. 18 th Component Layout Overall Project Objective: Design an Air-Fuel.
Team W3: Anthony Marchetta Derek Ritchea David Roderick Adam Stoler Milestone 4: Feb. 11 th Gate Level Design Overall Project Objective: Design an Air-Fuel.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage II: February 4 th 2004.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage II: 26 th January 2004.
Idongesit Ebong (1-1) Jenna Fu (1-2) Bowei Gai (1-3) Syed Hussain (1-4) Jonathan Lee (1-5) Design Manager: Myron Kwai Overall Project Objective: Design.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage III: February 9 h 2004.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Team W1 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage I: 21 st January 2004 DESIGN PROPOSAL Presentation #1:
1 GPS Waypoint Navigation Team M-2: Charles Norman (M2-1) Julio Segundo (M2-2) Nan Li (M2-3) Shanshan Ma (M2-4) Design Manager: Zack Menegakis Presentation.
Camera Auto Focus Group W1 Tom Goff Dave Hwang Kate Killfoile Greg Look Design Manager: Bowei Gai Final Presentation, April 30 th, 2007 Project Objective:
Idongesit Ebong (1-1) Jenna Fu (1-2) Bowei Gai (1-3) Syed Hussain (1-4) Jonathan Lee (1-5) Design Manager: Myron Kwai Overall Project Objective: Design.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
[M2] Traffic Control Group 2 Chun Han Chen Timothy Kwan Tom Bolds Shang Yi Lin Manager Randal Hong Mon. Nov. 24 Overall Project Objective : Dynamic Control.
Team W1 Design Manager: Rebecca Miller 1. Bobby Colyer (W11) 2. Jeffrey Kuo (W12) 3. Myron Kwai (W13) 4. Shirlene Lim (W14) Stage IV: February 18 h 2004.
1 Design Goal Design an Analog-to-Digital Conversion chip to meet demands of high quality voice applications such as: Digital Telephony, Digital Hearing.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Feistel Cipher Structure
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
CHAPTER 8 Developing Hard Macros The topics are: Overview Hard macro design issues Hard macro design process Physical design for hard macros Block integration.
Cracking the DES Encryption
Data Encryption Standard (DES)
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Cipher- introduction
Encrypted Transaction with Triple DES
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Encryption / Decryption on FPGA Midterm Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Data Encryption Standard
Alpha Blending and Smoothing
SYMMETRIC ENCRYPTION.
Presentation transcript:

Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure credit card transaction using 3DES encryption using Kerberos-style authentication. Current Stage: Short Final Presentation 04/12/2004 Design Manager: Rebecca Miller

Status Update  Have not found source of voltage drop on Vdd problem  Debugging Attempts 1) Simulate PC alone with long Vdd & Gnd rails: Works 1) Simulate PC alone with long Vdd & Gnd rails: Works 2) Simulate (1) with min sized buffers on input AND output: Works 2) Simulate (1) with min sized buffers on input AND output: Works 3) Simulate PCROM alone with long Vdd & Gnd rails: Works 3) Simulate PCROM alone with long Vdd & Gnd rails: Works 4) Simulate (3) with min sized buffers on input AND output: Works 4) Simulate (3) with min sized buffers on input AND output: Works 5) Simulate PC & PCROM together without resistances: Works 5) Simulate PC & PCROM together without resistances: Works 6) Simulate PC & PCROM together with resistances: Doesn't Work 6) Simulate PC & PCROM together with resistances: Doesn't Work 7) Remove excess M1 to Gnd contacts in ROM and decoder in (6): Doesn't Work 7) Remove excess M1 to Gnd contacts in ROM and decoder in (6): Doesn't Work 8) Do (7) with NWell and contacts along long Vdd rail: Works 8) Do (7) with NWell and contacts along long Vdd rail: Works They’re connected by a few microns of wire: Shouldn’t be a problem They’re connected by a few microns of wire: Shouldn’t be a problem  Workaround: Layed Vdd and Gnd rails everywhere possible  Runs at 150MHz

Project Description  Implement Triple DES Encryption using 0.18μ CMOS technology  Attain speeds appropriate for application in Automated Teller Machines (200MHz)  Integrate Encryption into ATM transation  Use Kerberos-style authentication Encrypt User Information as data using CC# and Pin as Keys Encrypt User Information as data using CC# and Pin as Keys Transaction Authorizer decrypts using CC# and Pin (which they know) Transaction Authorizer decrypts using CC# and Pin (which they know)  Credit Card Number and PIN are never transmitted, but are essential to authenticate

Marketability  Point-of-sale terminals transmit your name, credit card number, and expiration dates ‘in the clear.’  Credit and charge card fraud costs cardholders and issuers hundreds of millions of dollars each year  Using Kerberos-style authentication, we transmit encrypted information that can be verified by the card authorizer without actually containing sensitive information.  Uses existing cards and phone network  Finalist for the 2001 Advanced Encryption Standard  April 1, 2005 – MasterCard requires all ATMs be 3DES compliant

System Integration Triple DES Compliant Encrypted Card# + PIN Verified Unencrypted Card# + PIN Triple DES Encryption

The 3DES Algorithm  Overview Block Cipher - acts on a 64-bit block of plaintext Block Cipher - acts on a 64-bit block of plaintext Converts it into a 64-bit block of cipher text using a 56-bit key Converts it into a 64-bit block of cipher text using a 56-bit key Specified in FIPS Pub 46-3 Specified in FIPS Pub 46-3 Symmetric Key Cipher – encryption & decryption use same key Symmetric Key Cipher – encryption & decryption use same key  DES vs. 3DES 3DES applies 3 stages of DES with a separate key for each stage 3DES applies 3 stages of DES with a separate key for each stage Total key length in 3DES is 56 bits x 3 key = 168 bits Total key length in 3DES is 56 bits x 3 key = 168 bits  Stages Stage 1: Encrypt plaintext with Key 1 Stage 1: Encrypt plaintext with Key 1 Stage 2: Decrypt cipher text from Stage 1 with Key 2 (produces new cipher text) Stage 2: Decrypt cipher text from Stage 1 with Key 2 (produces new cipher text) Stage 2: Encrypt cipher text from Stage 2 with Key 3 Stage 2: Encrypt cipher text from Stage 2 with Key 3

3DES Algorithm Flowchart (I) DES DES -1 DES Plain Text DES -1 DES Cipher Text K1K1K1K1 K2K2K2K2 K3K3K3K3 Encryption Decryption

3DES Algorithm Flowchart (II) 64 bit plain Text cipher Text Initial Permutation Final Permutation 16 Rounds Encryption Extension 32 bit 48 bit 48 Bit XOR S Box 32 Bit XOR Right Half Left Half Subkey SingleRound

3DES Algorithm Flowchart (III) Final Permutation 48 bit Sub-key [ I ] I=16? Key Schedule 56bit Key I=1 Left/Right Half 28 bits Left Barrel Shift Initial Permutation I=I+1 Ready Y N

Original Floorplan PC (wiring) 64 -> 56 64’b 2:1 demux 56’b Key Latch 56’b 2:1 mux KeySub 56’b Register Des_ShiftREnc_ShiftL 32’b 2:1 demux 64’b 2:1 mux IP (wiring) Text 64’b Reg IP -1 Wiring Expand 48’b XOR 56’b 2:1 mux PC-2 wiring 56b -> 48b S-box 512 x 4’b P Wiring 32’b XOR Program Control (Instruction ROM) Input Output um um 64’b 2:1 mux 125,534 um 2 =.126 mm 2 Density.09 Trans/um 2 Revised Floorplan Total Area: um 2 = 0.112mm 2 Transistor Density: trans/ um um PC (wiring) 64 -> 56 64’b 2:1 demux 56’b Key Latch 56’b 2:1 mux KeySub 56’b Register Enc_ShiftL 32’b 2:1 demux 64’b 2:1 mux IP (wiring) Data Reg (L) 32’b IP -1 Wiring Expand 48’b XOR PC-2 wiring 56b -> 48b S-box 512 x 4’b P Wiring 32’b XOR Program Control (Instruction ROM) Input Output Dec_ShiftL Data Reg (R) 32’b 32’b 2:1 mux 415 um

 Verify C Simulation C Simulation Behavioral Behavioral Schematic Schematic Layout Layout Verification Expected Output : 2f 81 a8 bf 3c 6b df b4 C code Verification Behavioral Verification Structural Verification

Spice Verification

Problems Encountered  Spice Simulation Vdd Strength drops along conductor wires Vdd Strength drops along conductor wires No DC path to ground from node No DC path to ground from node  Layout Interconnections between components back and forth due to complicated algorithm Interconnections between components back and forth due to complicated algorithm Permutations take too much space Permutations take too much space

Module Specifications

 Input Pins 32 Data Pins (used for input text and keys) 32 Data Pins (used for input text and keys) 1 Clock Pin 1 Clock Pin 1 Reset Pin (asserted high) 1 Reset Pin (asserted high) 1 Vdd Pin 1 Vdd Pin 1 Ground Pin 1 Ground Pin  Output Pins 32 Cipher Text Pins (64’b cipher text delivered over 2 clocks) 32 Cipher Text Pins (64’b cipher text delivered over 2 clocks) 1 Valid Output Pin 1 Valid Output Pin 1 Get Next Key Pin 1 Get Next Key Pin  Total Pin Count: 70  Chip Aspect Ratio: 1.03  Chip Area: μm 2 = mm 2  Total Transistor Count: 13,697 (PMOS: 4,324 NMOS: 9,373)  Transistor Density: transistors/μm 2 = μm 2 /transistor  Operation: 256’b Input 64’b Output over 54 clock cycles  Faster Clock Speed: 150MHz  Total Throughput: Mbits / second Overall Chip Specifications

Layer Masks

Full Chip Layout Initial Permutation Barrel Shifting Initial Permutation Final Permutation Text Register P Permutation S BOX ROM and Decoders Program Control Input Latch Key Register PC2 Perumtation XOR Expand Permutation

Final Presentation Breakdown  MarketingEvan  Algorithm DescriptionXiaochun  Design ProcessEvan  Floorplan EvolutionTaewan  VerificationTaewan  IssuesYervant  SpecificationsXiaochun  LayoutYervant  ConclusionsYervant