1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

1 1.SHA-3 contest - Your Round 3 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in.
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
The Hardware Security Module. Agenda MAHOhard members To give background Project details Design and implementation.
Block Ciphers and the Data Encryption Standard
Principles of Information Security, 2nd edition1 Cryptography.
History Applications Attacks Advantages & Disadvantages Conclusion.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Extensible Processors. 2 ASIP Gain performance by:  Specialized hardware for the whole application (ASIC). −  Almost no flexibility. −High cost.  Use.
Cryptography and Network Security
AES clear a replacement for DES was needed
Design of a Reconfigurable Hardware For Efficient Implementation of Secret Key and Public Key Cryptography.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Performance Analysis of Processor Characterization Presentation Performed by : Winter 2005 Alexei Iolin Alexander Faingersh Instructor:
1 Benchmarking of Cryptographic Algorithms in Hardware Ekawat Homsirikamol & Kris Gaj George Mason University USA.
Implementation of DSP Algorithm on SoC. Characterization presentation Student : Einat Tevel Supervisor : Isaschar Walter Accompany engineer : Emilia Burlak.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
1 Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari,
RUN-TIME RECONFIGURATION FOR AUTOMATIC HARDWARE/SOFTWARE PARTITIONING Tom Davidson, Karel Bruneel, Dirk Stroobandt Ghent University, Belgium Presenting:
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Digital signature using MD5 algorithm Hardware Acceleration
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Computer Network Security ECE web page  Courses  Course web pages
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
A Compact and Efficient FPGA Implementation of DES Algorithm Saqib, N.A et al. In:International Conference on Reconfigurable Computing and FPGAs, Sept.
Performance and Overhead in a Hybrid Reconfigurable Computer O. D. Fidanci 1, D. Poznanovic 2, K. Gaj 3, T. El-Ghazawi 1, N. Alexandridis 1 1 George Washington.
TWOFISH ENCRYPTION ALGORITHM CS–627: Cryptology Fall 2004 Horatiu Paul Stancu.
Encryption for Mobile Computing By Erik Olson Woojin Yu.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
nd NESSIE Workshop Copyright (C) NTT&MELCO 2001 Update on Camellia Camellia Design Team.
PORTING A NETWORK CRYPTOGRAPHIC SERVICE TO THE RMC2000 : A CASE STUDY IN EMBEDDED SOFTWARE DEVELOPMENT.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
SHA-3 Candidate Evaluation 1. FPGA Benchmarking - Phase Round-2 SHA-3 Candidates implemented by 33 graduate students following the same design.
Cryptography and Network Security
1 Towards Optimal Custom Instruction Processors Wayne Luk Kubilay Atasu, Rob Dimond and Oskar Mencer Department of Computing Imperial College London HOT.
CprE / ComS 583 Reconfigurable Computing Prof. Joseph Zambreno Department of Electrical and Computer Engineering Iowa State University Lecture #10 – HW.
Accelerating Homomorphic Evaluation on Reconfigurable Hardware Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
ECE 545 Digital System Design with VHDL
Compilers for Embedded Systems Ram, Vasanth, and VJ Instructor : Dr. Edwin Sha Synthesis and Optimization of High-Performance Systems.
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Creating Security using Software and Hardware Bradley Herrup CS297- Security and Programming Languages.
Cryptography and Network Security
An optimization of the SAFER+ algorithm for custom hardware and TMS320C6x DSP implementation. By: Sachin Garg Vikas Sharma.
The Advanced Encryption Standard Part 1: Overview
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
RC6—The elegant AES choice Ron Rivest Matt Robshaw Yiqun Lisa Yin
High-Speed Architectures of the Cryptographic Hash Function BLAKE E.Umashankar, , M.E,VLSI Design Guide By Ms.M.Saroshree,A.P,ECE.
Design and Analysis of Low-Power novel implementation of encryption standard algorithm by hybrid method using SHA3 and parallel AES.
Information Security and Management (Abstract) 5
Implementation of IDEA on a Reconfigurable Computer
128-bit Block Cipher Camellia
RC6—The elegant AES choice
128-bit Block Cipher Camellia
Computer Programming.
128-bit Block Cipher Camellia
SOFTWARE IMPLEMENTATION OF OCB MODE
RC6—The elegant AES choice
128-bit Block Cipher Camellia
Update on Camellia Camellia Design Team Thank you, chairman.
Hashing Hash are the auxiliary values that are used in cryptography.
Advanced Encryption Standard
Presentation transcript:

1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in Software 3.Homomorphic Encryption 4.Security of GSM and 3G/4G Telephony 5.Security of Metro/Subway Cards 6.Security of Voting Machines 7.Survey of Codebreaking Machines and Projects Based on FPGAs, GPUs, Cell processors, etc. 8.Encryption Schemes for Copy Protection of Digital Media Analytical Projects

NSA-developed Cryptographic Standards time DES – Data Encryption Standard Triple DES SHA-1–Secure Hash Algorithm SHA-2 Block Ciphers Hash Functions SHA

Cryptographic Standard Contests time AES NESSIE CRYPTREC eSTREAM SHA-3 34 stream ciphers  4 SW+4 HW winners 51 hash functions  1 winner 15 block ciphers  1 winner IX.1997X.2000 I.2000XII.2002 V.2008 X.2007 XII.2012 XI.2004

4 SHA-3 Contest - NIST Evaluation Criteria Security Software Efficiency Hardware Efficiency Simplicity FPGAsASICs FlexibilityLicensing

AES Contest: Encryption time in clock cycles on various platforms Twofish team: Bruce Schneier & Doug Whiting better

6 eBACS: ECRYPT Benchmarking of Cryptographic Systems 6 measurements on multiple machines (currently over 70) each implementation is recompiled multiple times (currently over 1200 times) with various compiler options time measured in clock cycles/byte for multiple input/output sizes median, lower quartile (25 th percentile), and upper quartile (75 th percentile) reported standardized function arguments (common API) SUPERCOP - toolkit developed by D. Bernstein and T. Lange for measuring performance of cryptographic software See

7 1.Low Area Implementations of Two Selected SHA-3 Candidates and Comparison of Your Implementations with Implementations from Other Groups 2.Use of Embedded FPGA Resources (BRAMs, DSP units, etc.) in Implementations of 14 SHA-3 Candidates 3. Your ECE 545 project + extension discussed with the Instructor Hardware Projects

8 1.Optimizing Best Available Software Implementations of the SHA-3 candidates (using coding techniques, special instructions, assembly language, etc.). See 2.Comparing the sphlib 2.1 C (or Java) Implementations of Hash Functions with the Best C (or Java) Implementations Submitted to eBACS. See Porting Selected C Implementations of the SHA-3 Candidates to the TI MSP430 microcontroller or Other Microcontroller Available to You. See Software Projects