LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

International Data Encryption Algorithm
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Jeff Bilger - CSE P 590TU - Winter 2006 The Role of Cryptography in Combating Software Piracy.
Cryptanalysis on FPGA Based Hardware
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Principles of Information Security, 2nd edition1 Cryptography.
Zheming CSCE715.  A wireless sensor network (WSN) ◦ Spatially distributed sensors to monitor physical or environmental conditions, and to cooperatively.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
FIT3105 Smart card based authentication and identity management Lecture 4.
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Design of a Reconfigurable Hardware For Efficient Implementation of Secret Key and Public Key Cryptography.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Company LOGO Hashing System based on MD5 Algorithm Characterization Students: Eyal Mendel & Aleks Dyskin Instructor: Evgeny Fiksman High Speed Digital.
Lecture 23 Symmetric Encryption
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
CS 4/585: Cryptography Tom Shrimpton FAB
Cryptography, Authentication and Digital Signatures
Network Security Essentials Chapter 5
Midterm Review Cryptography & Network Security
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
Some Perspectives on Smart Card Cryptography
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
DPA Countermeasures by Improving the Window Method Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii Workshop on Cryptographic Hardware and Embedded.
Cracking the DES Encryption
Potential vulnerabilities of IPsec-based VPN
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptography CSS 329 Lecture 13:SSL.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Overview on Hardware Security
Home: Tel: , H.P.: Office: 공) 7710A
Crypto in information security
Hardware Cryptographic Coprocessor
Survey of Crypto CoProcessor Design
Security in Network Communications
Security of Wireless Sensor Networks
International Data Encryption Algorithm
Hashing Hash are the auxiliary values that are used in cryptography.
Presentation transcript:

LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010

COMPANY LOGO Hardware side of Cryptography Contents Introduction 1 Cryptography 2 Software vs. Hardware 3 Reconfigurable Hardware 4 Conclusions 5 2

COMPANY LOGO 1. Introduction 3 Hardware side of Cryptography

COMPANY LOGO Introduction 1/2  Shift to embedded & special purpose devices  Increase of electronic transactions & eCommerce  Large amount (soon bigger) of sensitive data transferred through insecure communication channels Hardware side of Cryptography 4

COMPANY LOGO Introduction 2/2  Imperative need to work under a secure model  Prevent unauthorized access  Warranty authenticity and integrity  Protect privacy  Application specific security level  Software, hardware and smart card cryptographic solutions Hardware side of Cryptography 5

COMPANY LOGO 2. Cryptography 6 Hardware side of Cryptography

COMPANY LOGO Cryptography 1/3  Cryptographic algoritmhs classes  Secret/Symmetric key ciphers (DES, AES, IDEA, Cast128, Camellia)  Public/Assymetric key ciphers (RSA, ECC)  Hash functions (MD5, SHA2, Whirlpool)  Modern ciphers designed to achieve high throughputs through high parallelism in hardware. Hardware side of Cryptography 7

COMPANY LOGO Cryptography 2/3  Advantages of secret key ciphers  higher rates of data throughput compared to public ciphers  hardware implementations achieve encrypt rates of hundreds of megabytes per second  software implementations achieve throughput rates of megabytes per second  much less computationally intensive than public key algorithm Hardware side of Cryptography 8

COMPANY LOGO Cryptography 3/3  Secret key ciphers operations  bit shuffling (permutation)  simple non-linear functions implemented as lookup tables (S-Boxes)  linear mixing (modulo) using XOR networks  Public key ciphers operations  modular addition/subtraction  modular multiplication-exponentiation  variable length rotation Hardware side of Cryptography 9

COMPANY LOGO 3. Hardware vs. Software 10 Hardware side of Cryptography VS.

COMPANY LOGO Hardware vs. Software 1/2 Software + Ease of use + Ease of upgrade + Portability + Low development costs + Flexibility - Low speed - High power consumption - Limited security Cryptographic Implementations Hardware + Low prices per unit + High speeds + Low power consumption + High parallelism level + High level security - High development costs - Lack of flexibility !What about reconfigurable hardware? Hardware side of Cryptography 11

COMPANY LOGO Hardware vs. Software 2/2 Crypto - System Cost Performance Security 12 Hardware side of Cryptography

COMPANY LOGO 4. Reconfigurable Hardware 13 Hardware side of Cryptography

COMPANY LOGO Reconfigurable Hardware 1/3  Combine characteristics from both software and hardware Hardware side of Cryptography 14

COMPANY LOGO Reconfigurable Hardware 2/3  Algorithm Agility: switching cryptographic algorithms (SSL, IPSec etc)  Algorithm Upload: Remote connection  Algorithm Modifications: Change parameters  Architecture Efficiency: For specific set of parameters -> efficient hardware Hardware side of Cryptography 15

COMPANY LOGO Reconfigurable Hardware 3/3  Cryptographic implementations in FPGA devices are in their first stages  Security issues – Side Channel Attacks  Timing Attacks  Power Analysis Attacks  Fault Injection Attacks  Noise Analysis Attacks  Cache Observation Attacks  Electromagnetic Analysis Attacks  Much effort from scientific community to establish a base secure model for cryptosystem designers Hardware side of Cryptography 16

COMPANY LOGO 5. Conclusions 17 Hardware side of Cryptography

COMPANY LOGO Conclusions  Large amount of digital info that need to be manipulated in a secure way.  The designer/user must make a tradeoff between performance, cost and security level.  FPGAs and hybrid reconfigurable hardware architectures are ideal for next generation cryptosystems.  Nothing is 100% secure!!!! Hardware side of Cryptography 18

LOGO Anestis Bechtsoudis Patra 2010