Presentation is loading. Please wait.

Presentation is loading. Please wait.

LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.

Similar presentations


Presentation on theme: "LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010."— Presentation transcript:

1 LOGO Hardware side of Cryptography Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010

2 COMPANY LOGO Hardware side of Cryptography Contents Introduction 1 Cryptography 2 Software vs. Hardware 3 Reconfigurable Hardware 4 Conclusions 5 2

3 COMPANY LOGO 1. Introduction 3 Hardware side of Cryptography

4 COMPANY LOGO Introduction 1/2  Shift to embedded & special purpose devices  Increase of electronic transactions & eCommerce  Large amount (soon bigger) of sensitive data transferred through insecure communication channels Hardware side of Cryptography 4

5 COMPANY LOGO Introduction 2/2  Imperative need to work under a secure model  Prevent unauthorized access  Warranty authenticity and integrity  Protect privacy  Application specific security level  Software, hardware and smart card cryptographic solutions Hardware side of Cryptography 5

6 COMPANY LOGO 2. Cryptography 6 Hardware side of Cryptography

7 COMPANY LOGO Cryptography 1/3  Cryptographic algoritmhs classes  Secret/Symmetric key ciphers (DES, AES, IDEA, Cast128, Camellia)  Public/Assymetric key ciphers (RSA, ECC)  Hash functions (MD5, SHA2, Whirlpool)  Modern ciphers designed to achieve high throughputs through high parallelism in hardware. Hardware side of Cryptography 7

8 COMPANY LOGO Cryptography 2/3  Advantages of secret key ciphers  higher rates of data throughput compared to public ciphers  hardware implementations achieve encrypt rates of hundreds of megabytes per second  software implementations achieve throughput rates of megabytes per second  much less computationally intensive than public key algorithm Hardware side of Cryptography 8

9 COMPANY LOGO Cryptography 3/3  Secret key ciphers operations  bit shuffling (permutation)  simple non-linear functions implemented as lookup tables (S-Boxes)  linear mixing (modulo) using XOR networks  Public key ciphers operations  modular addition/subtraction  modular multiplication-exponentiation  variable length rotation Hardware side of Cryptography 9

10 COMPANY LOGO 3. Hardware vs. Software 10 Hardware side of Cryptography VS.

11 COMPANY LOGO Hardware vs. Software 1/2 Software + Ease of use + Ease of upgrade + Portability + Low development costs + Flexibility - Low speed - High power consumption - Limited security Cryptographic Implementations Hardware + Low prices per unit + High speeds + Low power consumption + High parallelism level + High level security - High development costs - Lack of flexibility !What about reconfigurable hardware? Hardware side of Cryptography 11

12 COMPANY LOGO Hardware vs. Software 2/2 Crypto - System Cost Performance Security 12 Hardware side of Cryptography

13 COMPANY LOGO 4. Reconfigurable Hardware 13 Hardware side of Cryptography

14 COMPANY LOGO Reconfigurable Hardware 1/3  Combine characteristics from both software and hardware Hardware side of Cryptography 14

15 COMPANY LOGO Reconfigurable Hardware 2/3  Algorithm Agility: switching cryptographic algorithms (SSL, IPSec etc)  Algorithm Upload: Remote connection  Algorithm Modifications: Change parameters  Architecture Efficiency: For specific set of parameters -> efficient hardware Hardware side of Cryptography 15

16 COMPANY LOGO Reconfigurable Hardware 3/3  Cryptographic implementations in FPGA devices are in their first stages  Security issues – Side Channel Attacks  Timing Attacks  Power Analysis Attacks  Fault Injection Attacks  Noise Analysis Attacks  Cache Observation Attacks  Electromagnetic Analysis Attacks  Much effort from scientific community to establish a base secure model for cryptosystem designers Hardware side of Cryptography 16

17 COMPANY LOGO 5. Conclusions 17 Hardware side of Cryptography

18 COMPANY LOGO Conclusions  Large amount of digital info that need to be manipulated in a secure way.  The designer/user must make a tradeoff between performance, cost and security level.  FPGAs and hybrid reconfigurable hardware architectures are ideal for next generation cryptosystems.  Nothing is 100% secure!!!! Hardware side of Cryptography 18

19 LOGO Anestis Bechtsoudis mpechtsoud@ceid.upatras.gr Patra 2010


Download ppt "LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010."

Similar presentations


Ads by Google