SlideShare a Scribd company logo
1 of 28
Download to read offline
Computer Systems and Networks Department
The need for lightweight cryptography
The upcoming era of pervasive computing
will be characterized by many smart devices that
– because of the tight cost constraints inherent
in mass deployments – have very limited
resources in terms of memory, computing
power, and battery supply.
Christof Paar, Axel Poschmann
Slide 2
Computer Systems and Networks Department
The need for lightweight cryptography
Areas benefiting from lightweight cryptography:
■ RFID (radio frequency identification)
■ Electronic (biometric) passport;
■ SCADA (supervisory control and data acquisition);
■ Implantable medical devices;
■ Modern automobiles;
■ The “internet of things”
Slide 3
Computer Systems and Networks Department
RFID
Radio-frequency identification (RFID) is
the wireless use of electromagnetic fields to
transfer data, for the purposes of
automatically identifying and tracking tags
attached to objects. The tags contain
electronically stored information
The RFID world market is estimated to
surpass US$20 billion by 2014
Since RFID tags can be attached to
cash, clothing, possessions, or even
implanted within people, the possibility of
reading personally-linked information
without consent has raised serious privacy
concerns.
Slide 4
Computer Systems and Networks Department
SCADA (supervisory control and data acquisition)
SCADA communications must
be protected. As sensing is
increasingly done via battery-
operated, wireless devices, the
cryptography should have a
small footprint.
In 2012, the NIST called for:
“Research in lightweight, low-
power cryptography, enabling
encryption for millions of
smart meters and other
devices for Smart Grid with
limited computational power”
Slide 5
Computer Systems and Networks Department
E-passport and ID cards
ePassport is a combined paper and
electronic passport that contains
biometric information (Fingerprint, iris and face)
that can be used to authenticate the identity of
travelers. It uses contactless smart
card technology, including computer chip and
antenna.
Slide 6
Computer Systems and Networks Department
Implantable medical devices
A lot of modern implantable medical devices like Deep Brain
Neurostimulators, Insulin pump, Gastric Stimulator, Foot Drop
implants, Cardiac Defibrillators and many other devices need from
time to time communicate with some medical networks
Slide 7
Computer Systems and Networks Department
Internet of things
Internet of Things is connecting any device
which has the capability of switching on
and off to the internet. When you say ‘any
device’ , it largely means any device like
cellphones, coffee makers, headphones,
lamps, doors, windows and almost
anything you can think of. Gartner, the
analysis firm puts forward that by the year
2020 there will be as many as twenty six
billion devices connected to the internet.
Thus, IoT is a giant connection of things via
internet. This is more or less a relationship
between things.
A world where physical objects are seamlessly integrated
into the information network, and where the physical
objects can become active participants in information
processes. Services are available to interact with these
“smart objects” over the Internet, query and change their
state and any information associated with them, taking into
account security and privacy issues.
IoT Defenition SAP Research
Slide 8
Computer Systems and Networks Department
Main Restriction in Lightweight Cryptography
■ Power consumptions
■ Chip size
■ Size of program code
■ Size of Random Access Memory(RAM)
■ Time for program execution
■ Width of communication channel
Slide 9
Computer Systems and Networks Department
What is Lightweight Cryptography?
Lightweight Cryptography is the collection of
cryptographic primitives, techniques and ciphers that
can be implemented in highly resource-constrained
mobile devices. Such devices harvest energy for all their
functions, communicates over band limited channels and
every gate used for security is considered an additional
cost that must be carefully utilized. In the lightweight
context, designer has to analyze the computational
complexity of the algorithm, with respect to the demands
on the hardware and other limitations of the device.
There are both a direction and constraining challenge in
these limitations that guide the development of
cryptography.
Mathieu David. “Lightweight Cryptography for Passive RFID Tags. 2011
Slide 10
Computer Systems and Networks Department
Design trade-off
Slide 11
Computer Systems and Networks Department
Design criteria
Taking into account restrictions stated above we can
formulate follow basic criteria:
■ Ultra-small hardware implementation
■ Multiple block and key sizes for good application fit
■ Easy implementation
■ High-speed, low-memory software implementations
■ Flexible implementation
■ Security is determined by key size.
Slide 12
Computer Systems and Networks Department
Approaches
There are three main approaches to the construction of
lightweight crypto primitives:
1. Minimization and optimization of well-known and
proven algorithms
2. Modification of well-known primitives for highly
resource-constrained requirements
3. Design new crypto primitives which were originally
optimized for low cost hardware implementation.
Slide 13
Computer Systems and Networks Department
Metrics
Area: Area requirements are usually measured in
2
m , but this value depends
on the fabrication technology and the standard cell library. In order to compare
the area requirements independently it is common to state the area as gate
equivalents [GE]. One GE is equivalent to the area which is required by the
two-input NAND gate with the lowest driving strength of the appropriate
technology. The area in GE is derived by dividing the area in
2
m by the area
of a two-input NAND gate.
Cycles: Number of clock cycles to compute and read out the result.
Time: The required amount of time for a certain operation can be calculated by
dividing the amount of cycles by the operating frequency
freq
cycles
t  .
Throughput: The rate at which new output is produced with respect to time.
The number of output bits is divided by the time, i.e. by the needed cycles and
multiplied by the operating frequency. It is expressed in bits per second [bps].
Slide 14
Computer Systems and Networks Department
Metrics(continuation)
Power: The power consumption is estimated on the gate level by Synopsys
PowerCompiler. It is provided in micro Watt [μW]. Note that power estimations
on the transistor level are more accurate, but this would also require further
design steps in the design flow, e.g. the place&route step.
Energy: The energy consumption denotes the power consumption over a
certain time period. It can be calculated by multiplying the power consumption
with the required time of the operation. For the efficiency of a cryptographic
algorithm it might be interesting also to know the energy consumption per
output bit. The energy consumption is provided in micro Joule [μJ] or micro
Joule per bit [μJ/bit], respectively.
Current: The power consumption divided by the typical core voltage of the
library.
Efficiency: The throughput to area ratio is used as a measure of hardware
efficiency. The hardware efficiency is calculated by dividing the area
requirements by the throughput, i.e.
throughput
area
eff  , and is expressed in gate
equivalents per bits per second 





bps
GE
.
Slide 15
Computer Systems and Networks Department
Lightweight Cryptography
Slide 16
Computer Systems and Networks Department
Security for Block Ciphers
Slide 17
Computer Systems and Networks Department
Parameters of hardware realization
Slide 18
Computer Systems and Networks Department
Block Ciphers(PRESENT)
PRESENT(ISO/IEC 29192-2:2012) is a new ultra lightweight block cipher
algorithm, developed by the Orange Labs, Ruhr University Bochum and the
Technical University of Denmark. It is one of the most compact encryption
methods ever designed and is 2.5 times smaller than AES. PRESENT is a
classical example of SP-network and consist of 31 rounds. The block length
is 64 bits and 2 key lengths of 80 and 128 bits are supported.
Each round consist of XOR-operation with round key Ki consist of 64 bits then
go through 16 similar 4bits S-blocks and then go through permutation level.
Slide 19
Computer Systems and Networks Department
Block Ciphers(PRESENT)
Authors of ciphers recommend 80-bit key length that
guarantee more then adequate level of security for the
low-security applications typically required in tag-based
deployment.
Slide 20
Computer Systems and Networks Department
Block Ciphers(CLEFIA)
CLEFIA(ISO/IEC 29192-2:2012) is a proprietary block cipher algorithm, developed
by Sony. The block size is 128 bits and the key size can be 128 bit, 192 bit or 256 bit.
It is intended to be used in DRM systems. Based on the classical “Feistel network”
structure.
Slide 21
Computer Systems and Networks Department
Stream Ciphers(Trivium)
Trivium(ISO/IEC 29192-3) is a synchronous stream cipher designed to provide a
flexible trade-off between speed and gate count in hardware, and reasonably efficient
software implementation. It generates up to 264 bits of output from an 80-bit key and
an 80-bit IV(Initial Vector).
Slide 22
Computer Systems and Networks Department
Stream Ciphers(Enocoro)
Enocoro(ISO/IEC 29192-3) is a synchronous stream cipher designed by Hitachi
Corp. There are two possible variants with 80-bit security and 128-bit security. In the
standard included second version of 128-bit security Encoro-128v2.
Key length for such realization is 128-bit, IV -64-bit. Output is 1 byte per round and up
to 264bytes for each key and IV
Slide 23
Computer Systems and Networks Department
Symmetric Lightweight Cryptography
Slide 24
Computer Systems and Networks Department
Lightweight Hash functions
Lightweight hash function are lightweight cryptographic primitives.
The NIST provides figures for hardware implementation of the SHA-3 finalists aimed
at optimizing the area. For a 0.09 µm technology, the best they can achieve is 9,200
GE for Grøstl; Keccak (the winner of the competition) requiring at least 15,200 GE.
These are way too much for, say, RFID tags. That is why lightweight hash functions
have been proposed.
ARMADILLO2 is a multi-purprose primitive intended to be used as a FIL-MAC
(application I), for hashing and digital signatures (application II) and as a PRNG and
PRF (application III). It has been broken by Naya-Plasencia and Peyrin who managed
to find collisions when it is used as a hash function in very small time
DM-PRESENT is simply a Merkle-Damgård scheme where the compression function
is the block cipher PRESENT in Davies-Meyer mode. DM-PRESENT-80 is based on
PRESENT-80 and DM-PRESENT-128 on PRESENT-128. Such hash functions will
only be of use in applications that require the one-way property and 64-bit security.
GLUON is a T-sponge, meaning that it is a sponge with a non-injective update
function. The said function is based on the software oriented stream-ciphers X-FCSR-
v2 and F-FCSR-H-v3. The update function of GLUON-64 is many to one and has a
behavior which is very different from that of a random function.
Slide 25
Computer Systems and Networks Department
Lightweight Hash functions(continuation)
Photon is a P-Sponge based on an AES-like permutation. The throughput figures
given correspond to throughput when outputting long messages as these are the
ones usually given. However, the figures for shorter messages are smaller (i.e.
better) for PHOTON. The design of the permutation used to update the sponge is
close to the LED cipher.
QUARK is a P-Sponge with a hardware oriented permutation inspired by the
lightweight block ciphers KTANTAN and KATAN and the hardware oriented stream
cipher Grain. The smallest version (136 bits long digest) is called U-QUARK, the
middle one (176 bits long digest) D-QUARK and the longest (256 bits long digest) S-
QUARK. A modified version of C-QUARK ca be used as an authenticated encryption
scheme.
SPN-Hash. The main interest of this hash function is its provable security against
differential collision attacks. It is a JH-like structure using, as its name indicates, a
permutation based on SPN. The structure of the SPN is based on that of the AES.
The padding used is the same as in a strengthened Merkle-Damgård: the length of
the message is appended to the last block.
SPONGENT can be seen as a P-Sponge where the permutation is a modified version
of the block cipher PRESENT. These primitives actually have several designers in
common. The number of rounds of the PRESENT-like permutation ranges from 45 for
SPONGENT-80 to 140 for SPONGENT-256. There is no attack on SPONGENT to
the best of our knowledge except for linear distinguishers for reduced-round versions
Slide 26
Computer Systems and Networks Department
Lightweight Public-key Cryptography
In 2006 Girault, Poupard and Stern proposed an “On the Fly Authentication and
Signature Scheme Based on Groups of Unknown Order”. Crypto-GPS is standardized
within the international standard ISO/IEC 9798-5.
Crypto-GPS offers a variety of parameters for different security-performance trade-
offs. Though there are variants of the crypto-GPS scheme that are based on RSA-like
moduli, better to use variant with elliptic curve operations, because it allows smaller
keys.
Slide 27
Computer Systems and Networks Department
Lightweight Public-key Cryptography
Slide 28
Computer Systems and Networks Department
Conclusions
The upraise of lightweight devices, such as RFID tags, has created
new security and privacy challenges. Since these devices are so
ubiquitous and communication goes unnoticed they can easily be
abused.
Lightweight cryptographic primitives should...
– Have a short internal state (to lower area)
– Have a short processing time (to lower energy)
– Have a short output (to lower communication overhead)
Symmetric crypto with less than 1000 gates is feasible
– Cost is then dominated by memory
– Software: RAM usage is critical
Lightweight hash function from 7000 to 2000 GE is feasible
– Collision resistance is then dominated by size
Lightweight public-key crypto with less than 10000 GE is feasible
–
Slide 29

More Related Content

What's hot

Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit satIAESIJEECS
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...IJECEIAES
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...IRJET Journal
 
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Dominique Guinard
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 

What's hot (20)

ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
G05215356
G05215356G05215356
G05215356
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit sat
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...Evaluation of the Technology Supporting the Development of an Assets Tracking...
Evaluation of the Technology Supporting the Development of an Assets Tracking...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 

Similar to Малоресурсная криптография - Сергей Мартыненко

Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx40NehaPagariya
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tIJARIIT
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
H63ECH_1A_023799_Osama
H63ECH_1A_023799_OsamaH63ECH_1A_023799_Osama
H63ECH_1A_023799_OsamaOsama Azim
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15Mark Goldstein
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 

Similar to Малоресурсная криптография - Сергей Мартыненко (20)

Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Iaetsd near field
Iaetsd near fieldIaetsd near field
Iaetsd near field
 
Design and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io tDesign and implementation of microcontroller in fpga for io t
Design and implementation of microcontroller in fpga for io t
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
H63ECH_1A_023799_Osama
H63ECH_1A_023799_OsamaH63ECH_1A_023799_Osama
H63ECH_1A_023799_Osama
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
Beagle board
Beagle boardBeagle board
Beagle board
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 

More from HackIT Ukraine

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...HackIT Ukraine
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей ГолубевHackIT Ukraine
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир ОбризанHackIT Ukraine
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий КайдаловHackIT Ukraine
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей КаракуловHackIT Ukraine
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим МирошниченкоHackIT Ukraine
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий ГадомскийHackIT Ukraine
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii BaranovskyiHackIT Ukraine
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр ЧубарукHackIT Ukraine
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii LukinHackIT Ukraine
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro BudorinHackIT Ukraine
 
"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander Adamov"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander AdamovHackIT Ukraine
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer AmirHackIT Ukraine
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...HackIT Ukraine
 
"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser AliHackIT Ukraine
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...HackIT Ukraine
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim HegazyHackIT Ukraine
 
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...HackIT Ukraine
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesHackIT Ukraine
 

More from HackIT Ukraine (20)

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin
 
"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander Adamov"Using cryptolockers as a cyber weapon", Alexander Adamov
"Using cryptolockers as a cyber weapon", Alexander Adamov
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
 
"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Малоресурсная криптография - Сергей Мартыненко

  • 1. Computer Systems and Networks Department The need for lightweight cryptography The upcoming era of pervasive computing will be characterized by many smart devices that – because of the tight cost constraints inherent in mass deployments – have very limited resources in terms of memory, computing power, and battery supply. Christof Paar, Axel Poschmann Slide 2
  • 2. Computer Systems and Networks Department The need for lightweight cryptography Areas benefiting from lightweight cryptography: ■ RFID (radio frequency identification) ■ Electronic (biometric) passport; ■ SCADA (supervisory control and data acquisition); ■ Implantable medical devices; ■ Modern automobiles; ■ The “internet of things” Slide 3
  • 3. Computer Systems and Networks Department RFID Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information The RFID world market is estimated to surpass US$20 billion by 2014 Since RFID tags can be attached to cash, clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised serious privacy concerns. Slide 4
  • 4. Computer Systems and Networks Department SCADA (supervisory control and data acquisition) SCADA communications must be protected. As sensing is increasingly done via battery- operated, wireless devices, the cryptography should have a small footprint. In 2012, the NIST called for: “Research in lightweight, low- power cryptography, enabling encryption for millions of smart meters and other devices for Smart Grid with limited computational power” Slide 5
  • 5. Computer Systems and Networks Department E-passport and ID cards ePassport is a combined paper and electronic passport that contains biometric information (Fingerprint, iris and face) that can be used to authenticate the identity of travelers. It uses contactless smart card technology, including computer chip and antenna. Slide 6
  • 6. Computer Systems and Networks Department Implantable medical devices A lot of modern implantable medical devices like Deep Brain Neurostimulators, Insulin pump, Gastric Stimulator, Foot Drop implants, Cardiac Defibrillators and many other devices need from time to time communicate with some medical networks Slide 7
  • 7. Computer Systems and Networks Department Internet of things Internet of Things is connecting any device which has the capability of switching on and off to the internet. When you say ‘any device’ , it largely means any device like cellphones, coffee makers, headphones, lamps, doors, windows and almost anything you can think of. Gartner, the analysis firm puts forward that by the year 2020 there will be as many as twenty six billion devices connected to the internet. Thus, IoT is a giant connection of things via internet. This is more or less a relationship between things. A world where physical objects are seamlessly integrated into the information network, and where the physical objects can become active participants in information processes. Services are available to interact with these “smart objects” over the Internet, query and change their state and any information associated with them, taking into account security and privacy issues. IoT Defenition SAP Research Slide 8
  • 8. Computer Systems and Networks Department Main Restriction in Lightweight Cryptography ■ Power consumptions ■ Chip size ■ Size of program code ■ Size of Random Access Memory(RAM) ■ Time for program execution ■ Width of communication channel Slide 9
  • 9. Computer Systems and Networks Department What is Lightweight Cryptography? Lightweight Cryptography is the collection of cryptographic primitives, techniques and ciphers that can be implemented in highly resource-constrained mobile devices. Such devices harvest energy for all their functions, communicates over band limited channels and every gate used for security is considered an additional cost that must be carefully utilized. In the lightweight context, designer has to analyze the computational complexity of the algorithm, with respect to the demands on the hardware and other limitations of the device. There are both a direction and constraining challenge in these limitations that guide the development of cryptography. Mathieu David. “Lightweight Cryptography for Passive RFID Tags. 2011 Slide 10
  • 10. Computer Systems and Networks Department Design trade-off Slide 11
  • 11. Computer Systems and Networks Department Design criteria Taking into account restrictions stated above we can formulate follow basic criteria: ■ Ultra-small hardware implementation ■ Multiple block and key sizes for good application fit ■ Easy implementation ■ High-speed, low-memory software implementations ■ Flexible implementation ■ Security is determined by key size. Slide 12
  • 12. Computer Systems and Networks Department Approaches There are three main approaches to the construction of lightweight crypto primitives: 1. Minimization and optimization of well-known and proven algorithms 2. Modification of well-known primitives for highly resource-constrained requirements 3. Design new crypto primitives which were originally optimized for low cost hardware implementation. Slide 13
  • 13. Computer Systems and Networks Department Metrics Area: Area requirements are usually measured in 2 m , but this value depends on the fabrication technology and the standard cell library. In order to compare the area requirements independently it is common to state the area as gate equivalents [GE]. One GE is equivalent to the area which is required by the two-input NAND gate with the lowest driving strength of the appropriate technology. The area in GE is derived by dividing the area in 2 m by the area of a two-input NAND gate. Cycles: Number of clock cycles to compute and read out the result. Time: The required amount of time for a certain operation can be calculated by dividing the amount of cycles by the operating frequency freq cycles t  . Throughput: The rate at which new output is produced with respect to time. The number of output bits is divided by the time, i.e. by the needed cycles and multiplied by the operating frequency. It is expressed in bits per second [bps]. Slide 14
  • 14. Computer Systems and Networks Department Metrics(continuation) Power: The power consumption is estimated on the gate level by Synopsys PowerCompiler. It is provided in micro Watt [μW]. Note that power estimations on the transistor level are more accurate, but this would also require further design steps in the design flow, e.g. the place&route step. Energy: The energy consumption denotes the power consumption over a certain time period. It can be calculated by multiplying the power consumption with the required time of the operation. For the efficiency of a cryptographic algorithm it might be interesting also to know the energy consumption per output bit. The energy consumption is provided in micro Joule [μJ] or micro Joule per bit [μJ/bit], respectively. Current: The power consumption divided by the typical core voltage of the library. Efficiency: The throughput to area ratio is used as a measure of hardware efficiency. The hardware efficiency is calculated by dividing the area requirements by the throughput, i.e. throughput area eff  , and is expressed in gate equivalents per bits per second       bps GE . Slide 15
  • 15. Computer Systems and Networks Department Lightweight Cryptography Slide 16
  • 16. Computer Systems and Networks Department Security for Block Ciphers Slide 17
  • 17. Computer Systems and Networks Department Parameters of hardware realization Slide 18
  • 18. Computer Systems and Networks Department Block Ciphers(PRESENT) PRESENT(ISO/IEC 29192-2:2012) is a new ultra lightweight block cipher algorithm, developed by the Orange Labs, Ruhr University Bochum and the Technical University of Denmark. It is one of the most compact encryption methods ever designed and is 2.5 times smaller than AES. PRESENT is a classical example of SP-network and consist of 31 rounds. The block length is 64 bits and 2 key lengths of 80 and 128 bits are supported. Each round consist of XOR-operation with round key Ki consist of 64 bits then go through 16 similar 4bits S-blocks and then go through permutation level. Slide 19
  • 19. Computer Systems and Networks Department Block Ciphers(PRESENT) Authors of ciphers recommend 80-bit key length that guarantee more then adequate level of security for the low-security applications typically required in tag-based deployment. Slide 20
  • 20. Computer Systems and Networks Department Block Ciphers(CLEFIA) CLEFIA(ISO/IEC 29192-2:2012) is a proprietary block cipher algorithm, developed by Sony. The block size is 128 bits and the key size can be 128 bit, 192 bit or 256 bit. It is intended to be used in DRM systems. Based on the classical “Feistel network” structure. Slide 21
  • 21. Computer Systems and Networks Department Stream Ciphers(Trivium) Trivium(ISO/IEC 29192-3) is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software implementation. It generates up to 264 bits of output from an 80-bit key and an 80-bit IV(Initial Vector). Slide 22
  • 22. Computer Systems and Networks Department Stream Ciphers(Enocoro) Enocoro(ISO/IEC 29192-3) is a synchronous stream cipher designed by Hitachi Corp. There are two possible variants with 80-bit security and 128-bit security. In the standard included second version of 128-bit security Encoro-128v2. Key length for such realization is 128-bit, IV -64-bit. Output is 1 byte per round and up to 264bytes for each key and IV Slide 23
  • 23. Computer Systems and Networks Department Symmetric Lightweight Cryptography Slide 24
  • 24. Computer Systems and Networks Department Lightweight Hash functions Lightweight hash function are lightweight cryptographic primitives. The NIST provides figures for hardware implementation of the SHA-3 finalists aimed at optimizing the area. For a 0.09 µm technology, the best they can achieve is 9,200 GE for Grøstl; Keccak (the winner of the competition) requiring at least 15,200 GE. These are way too much for, say, RFID tags. That is why lightweight hash functions have been proposed. ARMADILLO2 is a multi-purprose primitive intended to be used as a FIL-MAC (application I), for hashing and digital signatures (application II) and as a PRNG and PRF (application III). It has been broken by Naya-Plasencia and Peyrin who managed to find collisions when it is used as a hash function in very small time DM-PRESENT is simply a Merkle-Damgård scheme where the compression function is the block cipher PRESENT in Davies-Meyer mode. DM-PRESENT-80 is based on PRESENT-80 and DM-PRESENT-128 on PRESENT-128. Such hash functions will only be of use in applications that require the one-way property and 64-bit security. GLUON is a T-sponge, meaning that it is a sponge with a non-injective update function. The said function is based on the software oriented stream-ciphers X-FCSR- v2 and F-FCSR-H-v3. The update function of GLUON-64 is many to one and has a behavior which is very different from that of a random function. Slide 25
  • 25. Computer Systems and Networks Department Lightweight Hash functions(continuation) Photon is a P-Sponge based on an AES-like permutation. The throughput figures given correspond to throughput when outputting long messages as these are the ones usually given. However, the figures for shorter messages are smaller (i.e. better) for PHOTON. The design of the permutation used to update the sponge is close to the LED cipher. QUARK is a P-Sponge with a hardware oriented permutation inspired by the lightweight block ciphers KTANTAN and KATAN and the hardware oriented stream cipher Grain. The smallest version (136 bits long digest) is called U-QUARK, the middle one (176 bits long digest) D-QUARK and the longest (256 bits long digest) S- QUARK. A modified version of C-QUARK ca be used as an authenticated encryption scheme. SPN-Hash. The main interest of this hash function is its provable security against differential collision attacks. It is a JH-like structure using, as its name indicates, a permutation based on SPN. The structure of the SPN is based on that of the AES. The padding used is the same as in a strengthened Merkle-Damgård: the length of the message is appended to the last block. SPONGENT can be seen as a P-Sponge where the permutation is a modified version of the block cipher PRESENT. These primitives actually have several designers in common. The number of rounds of the PRESENT-like permutation ranges from 45 for SPONGENT-80 to 140 for SPONGENT-256. There is no attack on SPONGENT to the best of our knowledge except for linear distinguishers for reduced-round versions Slide 26
  • 26. Computer Systems and Networks Department Lightweight Public-key Cryptography In 2006 Girault, Poupard and Stern proposed an “On the Fly Authentication and Signature Scheme Based on Groups of Unknown Order”. Crypto-GPS is standardized within the international standard ISO/IEC 9798-5. Crypto-GPS offers a variety of parameters for different security-performance trade- offs. Though there are variants of the crypto-GPS scheme that are based on RSA-like moduli, better to use variant with elliptic curve operations, because it allows smaller keys. Slide 27
  • 27. Computer Systems and Networks Department Lightweight Public-key Cryptography Slide 28
  • 28. Computer Systems and Networks Department Conclusions The upraise of lightweight devices, such as RFID tags, has created new security and privacy challenges. Since these devices are so ubiquitous and communication goes unnoticed they can easily be abused. Lightweight cryptographic primitives should... – Have a short internal state (to lower area) – Have a short processing time (to lower energy) – Have a short output (to lower communication overhead) Symmetric crypto with less than 1000 gates is feasible – Cost is then dominated by memory – Software: RAM usage is critical Lightweight hash function from 7000 to 2000 GE is feasible – Collision resistance is then dominated by size Lightweight public-key crypto with less than 10000 GE is feasible – Slide 29