Download presentation
Presentation is loading. Please wait.
Published byGwenda Holt Modified over 9 years ago
1
LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010
2
COMPANY LOGO Hardware side of Cryptography Contents Introduction 1 Cryptography 2 Software vs. Hardware 3 Reconfigurable Hardware 4 Conclusions 5 2
3
COMPANY LOGO 1. Introduction 3 Hardware side of Cryptography
4
COMPANY LOGO Introduction 1/2 Shift to embedded & special purpose devices Increase of electronic transactions & eCommerce Large amount (soon bigger) of sensitive data transferred through insecure communication channels Hardware side of Cryptography 4
5
COMPANY LOGO Introduction 2/2 Imperative need to work under a secure model Prevent unauthorized access Warranty authenticity and integrity Protect privacy Application specific security level Software, hardware and smart card cryptographic solutions Hardware side of Cryptography 5
6
COMPANY LOGO 2. Cryptography 6 Hardware side of Cryptography
7
COMPANY LOGO Cryptography 1/3 Cryptographic algoritmhs classes Secret/Symmetric key ciphers (DES, AES, IDEA, Cast128, Camellia) Public/Assymetric key ciphers (RSA, ECC) Hash functions (MD5, SHA2, Whirlpool) Modern ciphers designed to achieve high throughputs through high parallelism in hardware. Hardware side of Cryptography 7
8
COMPANY LOGO Cryptography 2/3 Advantages of secret key ciphers higher rates of data throughput compared to public ciphers hardware implementations achieve encrypt rates of hundreds of megabytes per second software implementations achieve throughput rates of megabytes per second much less computationally intensive than public key algorithm Hardware side of Cryptography 8
9
COMPANY LOGO Cryptography 3/3 Secret key ciphers operations bit shuffling (permutation) simple non-linear functions implemented as lookup tables (S-Boxes) linear mixing (modulo) using XOR networks Public key ciphers operations modular addition/subtraction modular multiplication-exponentiation variable length rotation Hardware side of Cryptography 9
10
COMPANY LOGO 3. Hardware vs. Software 10 Hardware side of Cryptography VS.
11
COMPANY LOGO Hardware vs. Software 1/2 Software + Ease of use + Ease of upgrade + Portability + Low development costs + Flexibility - Low speed - High power consumption - Limited security Cryptographic Implementations Hardware + Low prices per unit + High speeds + Low power consumption + High parallelism level + High level security - High development costs - Lack of flexibility !What about reconfigurable hardware? Hardware side of Cryptography 11
12
COMPANY LOGO Hardware vs. Software 2/2 Crypto - System Cost Performance Security 12 Hardware side of Cryptography
13
COMPANY LOGO 4. Reconfigurable Hardware 13 Hardware side of Cryptography
14
COMPANY LOGO Reconfigurable Hardware 1/3 Combine characteristics from both software and hardware Hardware side of Cryptography 14
15
COMPANY LOGO Reconfigurable Hardware 2/3 Algorithm Agility: switching cryptographic algorithms (SSL, IPSec etc) Algorithm Upload: Remote connection Algorithm Modifications: Change parameters Architecture Efficiency: For specific set of parameters -> efficient hardware Hardware side of Cryptography 15
16
COMPANY LOGO Reconfigurable Hardware 3/3 Cryptographic implementations in FPGA devices are in their first stages Security issues – Side Channel Attacks Timing Attacks Power Analysis Attacks Fault Injection Attacks Noise Analysis Attacks Cache Observation Attacks Electromagnetic Analysis Attacks Much effort from scientific community to establish a base secure model for cryptosystem designers Hardware side of Cryptography 16
17
COMPANY LOGO 5. Conclusions 17 Hardware side of Cryptography
18
COMPANY LOGO Conclusions Large amount of digital info that need to be manipulated in a secure way. The designer/user must make a tradeoff between performance, cost and security level. FPGAs and hybrid reconfigurable hardware architectures are ideal for next generation cryptosystems. Nothing is 100% secure!!!! Hardware side of Cryptography 18
19
LOGO Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.