Encryption for Mobile Computing By Erik Olson Woojin Yu.

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
Stream Ciphers Part 1  Cryptography 3 Stream Ciphers.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Zheming CSCE715.  A wireless sensor network (WSN) ◦ Spatially distributed sensors to monitor physical or environmental conditions, and to cooperatively.
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
AES clear a replacement for DES was needed
Design of a Reconfigurable Hardware For Efficient Implementation of Secret Key and Public Key Cryptography.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Cryptography & Number Theory
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Foundations of Network and Computer Security J J ohn Black Lecture #6 Sep 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Frank Rowe John Gaetano Chuck Figiel.  CryptoViz implements and visualizes the Data Encryption Standard (DES) algorithm.  DES was used by the government.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Number Theory and Advanced Cryptography 1. Finite Fields and AES
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
TWOFISH ENCRYPTION ALGORITHM CS–627: Cryptology Fall 2004 Horatiu Paul Stancu.
DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
CIM Symmetric Ciphers 31 Advanced Encryption Standard Ch 5 of Cryptography and Network Security -Third Edition by William Stallings Modified from.
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Implementing the RC4 Algorithm
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Cryptography Team Presentation 2
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Fifth Edition by William Stallings
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
Chapter 2 Symmetric Encryption.
The RC6 Block Cipher: A simple fast secure AES proposal
1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
The Advanced Encryption Standard Part 1: Overview
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
RC6—The elegant AES choice Ron Rivest Matt Robshaw Yiqun Lisa Yin
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
The RC6 Block Cipher: A simple fast secure. Design Philosophy u Leverage our experience with RC5: use data-dependent rotations to achieve a high level.
Provides Confidentiality
School of Computer Science and Engineering Pusan National University
RC6—The elegant AES choice
RC6—The elegant AES choice
微處理機 Microprocessor (100上) ARM 內核嵌入式SOC原理
Blowfish Encryption Algorithm
Presentation transcript:

Encryption for Mobile Computing By Erik Olson Woojin Yu

Encryption Algorithms DES and 3DES RC5 RC6 – AES Finalist Twofish- AES Finalist

DES and 3DES DES - International Standard, 1970’s 3DES – repeated encryption with DES Extensive usage of permutation, table look-ups, and rotational shifts 56 bit key – weak encryption

RC5 Fast block cipher By Ron Rivest at RSA in 1994 Based on integer addition, data dependent rotational shifts and XOR’s Very simple, but powerful Patented

RC6 Based on RC5 algorithm One finalist for AES 128 bit blocks for AES Flexible

Twofish AES finalist XOR’s, 32 bit and 4 bit rotational shifts, table lookups, and matrix operations Scalable and parameterizable Some operations can be done in parallel

Processor in Our Survey Motorola DragonBall EZ - 68K core - Primarily used in Palm Pilots Mhz MIPS rating

Setup and Makekey Shifts and Rotational Shifts –A=A>>8 –ROTL(x,n)= (x > 0x20-(n&0x1f)) Word Swapping –A->B, B->A Extensive usage of loops Array operations –S[I]=S[I-1]+4

3DES Setup

RC5 Setup

RC6 Setup

Twofish Setup

Core Operations Rotational Shifts –ROTL(x,n)= (x > 0x20-(n&0x1f)) –ROTR(x,n)= (x>>(n & 0x1f))|(x << 0x20-(n&0x1f)) XOR –A=A^B

Core Op Cont’d Integer Operations –A=A+S[0] Bit Permutation –A= SP={5,7,1,3,2,8,4,6} A= after permutation Using Constants –P=0xb7e15163, –A=A^P

3DES Core

RC5 Core

RC6 Core

Twofish Core

Analysis & Improvement Using Rotational Shift instruction Implementing special shifting unit LSR and LSL dominate the clock cycles Minimize Move Instruction/Penalty

Analysis Cont’d Improvement using ROT instruction –1.5 times speed up in encryption core Improvement using fast rotation HW –2 times speed up in encryption core

Analysis Cont’d 3DES Core –6.1 Kbps RC5 Core –121 Kbps –Improved version : 272 Kbps RC6 Core –87 Kbps –Improved version : 187 Kbps Twofish –12.8 Kbps

Conclusion Dominance of shifts and rotational shifts in all encryption algorithms Limited improvement provided by the specialized hardware Importance of algorithm choice for optimal usage

Future Recommendations Analysis on Windows CE processors – Hitachi SH3 and StrongArm Analysis involving more instruction parallelism Analysis on configurable processors - Tensilica