SlideShare a Scribd company logo
Exploiting parallelism opportunities in
non-parallel architectures to improve
NLFSR software implementations
Pedro Malagón
Juan-Mariano de Goyeneche
José M. Moya
1 / 20
Context
• Remote Keyless Entry Systems (RKE)
– Small communications
– Two sides of communication know state
– Knowing previous state/message provides no
information of next state/message (ideally)
2
Global goal
3
• Automatic generation of different
implementations of the same encryption
algorithm
• Random execution of implementations in
order to introduce variability that increases
resistance against Side-Channel Attacks
LFSR (I)
• Linear Feedback Shift Registers
• Implementation
– Very simple in Hardware
– One-bit at a time in Software
4
LFSR (II)
• Pros:
– Pseudo-random sequence
– Long period: n-bits → 2n
– Simple implementation
• Cons:
– Berlekamp-Massey algorithm
• Observing 2n gives complete information of LFSR
5
NLFSR (I)
• Add non linearity to improve security
• Non-Linear Feedback Shift Registers
6
NLFSR (II)
• Implementation
– Focus on the NLF
– bit LUT
– Run-time computed: ANF
– Automatically detection of ci values
7
{ } { }
( ) ∑
−
= −−
−
••••=
→
12
0 11010
110
,,
1,01,0
n
n
i
i
n
ii
in
n
xxxcxxf KK
Concrete goal
8
• Goal: different implementations potentially automatic
• Two completley different implementations:
– ANF based and LUT based
• ANF drawbacks
– Too many run-time operations (boolean)
• Optimization of ANF based implementations
Round processing
• Feedback inputs can be available
• Available processing capabilities
– min (j - i, n) n-bit ALU, j-bit data, i bit
– Similar to MMX in AES implementations
9
round i+1
round i+1
LLVM Passes
10
• ANF implementation
• DAG building
• CFG generation
• Masking meta → valid bits
• Instruction scheduling (maximize bits)
• Loop instruction motion → Nested loops
– Power of two step
Test case
11
• KeeLoq in MSP430 (16-bit)
• Inputs: d0, d1, d9, d16, d20, d26, d31, k0
• Data: 32-bits
Experimental
12
• Compare 5 implementations
– 3 LUT based
– tb041: official PIC implementation
– nlf_tb041: mask calculation
– gen_tb041: official generic Microchip
– 2 ANF based
– bin_ops: one bit at a time
– par_bin_ops: applying optimizer
16-round
processing
< 33
Setup
output
par_bin_ops
13
• Implementation
Cycles (16 rounds)
14
Instructions (16 rounds)
15
Memory (16 rounds)
16
Conclusions
17
• Worst case
– Cycles improvement: 2.45
– Code size grows in 2.27
• Automatically generated
Thank you
18
Thank you for coming
Any questions?

More Related Content

What's hot

CArcMOOC 05.03 - Pipeline hazards
CArcMOOC 05.03 - Pipeline hazardsCArcMOOC 05.03 - Pipeline hazards
CArcMOOC 05.03 - Pipeline hazards
Alessandro Bogliolo
 
CArcMOOC 05.01 - Elementary pipelining and performance metrics
CArcMOOC 05.01 -  Elementary pipelining and performance metricsCArcMOOC 05.01 -  Elementary pipelining and performance metrics
CArcMOOC 05.01 - Elementary pipelining and performance metrics
Alessandro Bogliolo
 
BKK16-506 PMWG Farm
BKK16-506 PMWG FarmBKK16-506 PMWG Farm
BKK16-506 PMWG Farm
Linaro
 
INSTRUCTION PIPELING in TMS320C55x
INSTRUCTION PIPELING in TMS320C55xINSTRUCTION PIPELING in TMS320C55x
INSTRUCTION PIPELING in TMS320C55x
Varun Kambrath
 
Deccan RubyConf 2016 - Lighning Talk - SpiceRub
Deccan RubyConf 2016 - Lighning Talk - SpiceRubDeccan RubyConf 2016 - Lighning Talk - SpiceRub
Deccan RubyConf 2016 - Lighning Talk - SpiceRub
Gaurav Tamba
 
A Gomez TimTrack at C E S G A
A Gomez  TimTrack at C E S G AA Gomez  TimTrack at C E S G A
A Gomez TimTrack at C E S G AMiguel Morales
 
Loco Positioning System - FOSDEM 2017
Loco Positioning System - FOSDEM 2017Loco Positioning System - FOSDEM 2017
Loco Positioning System - FOSDEM 2017
bitcraze
 
1.v on neuman machine
1.v on neuman machine1.v on neuman machine
1.v on neuman machine
divyapramod
 
Real-time Change Detection & Automatic Network Response
Real-time Change Detection & Automatic Network ResponseReal-time Change Detection & Automatic Network Response
Real-time Change Detection & Automatic Network Response
Mike Fisk
 
MLPerf an industry standard benchmark suite for machine learning performance
MLPerf an industry standard benchmark suite for machine learning performanceMLPerf an industry standard benchmark suite for machine learning performance
MLPerf an industry standard benchmark suite for machine learning performance
jemin lee
 
Piplining
PipliningPiplining
Piplining
Sonu Mamman
 
Basic Block Scheduling
Basic Block SchedulingBasic Block Scheduling
Basic Block Scheduling
NilaNila16
 
resume-XinyuSui
resume-XinyuSuiresume-XinyuSui
resume-XinyuSuiXinyu Sui
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMKamran Ashraf
 
Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic pipline
A. Shamel
 
Efficient Bytecode Analysis: Linespeed Shellcode Detection
Efficient Bytecode Analysis: Linespeed Shellcode DetectionEfficient Bytecode Analysis: Linespeed Shellcode Detection
Efficient Bytecode Analysis: Linespeed Shellcode DetectionGeorg Wicherski
 

What's hot (19)

CArcMOOC 05.03 - Pipeline hazards
CArcMOOC 05.03 - Pipeline hazardsCArcMOOC 05.03 - Pipeline hazards
CArcMOOC 05.03 - Pipeline hazards
 
CArcMOOC 05.01 - Elementary pipelining and performance metrics
CArcMOOC 05.01 -  Elementary pipelining and performance metricsCArcMOOC 05.01 -  Elementary pipelining and performance metrics
CArcMOOC 05.01 - Elementary pipelining and performance metrics
 
BKK16-506 PMWG Farm
BKK16-506 PMWG FarmBKK16-506 PMWG Farm
BKK16-506 PMWG Farm
 
Realtime
RealtimeRealtime
Realtime
 
INSTRUCTION PIPELING in TMS320C55x
INSTRUCTION PIPELING in TMS320C55xINSTRUCTION PIPELING in TMS320C55x
INSTRUCTION PIPELING in TMS320C55x
 
Deccan RubyConf 2016 - Lighning Talk - SpiceRub
Deccan RubyConf 2016 - Lighning Talk - SpiceRubDeccan RubyConf 2016 - Lighning Talk - SpiceRub
Deccan RubyConf 2016 - Lighning Talk - SpiceRub
 
A Gomez TimTrack at C E S G A
A Gomez  TimTrack at C E S G AA Gomez  TimTrack at C E S G A
A Gomez TimTrack at C E S G A
 
Loco Positioning System - FOSDEM 2017
Loco Positioning System - FOSDEM 2017Loco Positioning System - FOSDEM 2017
Loco Positioning System - FOSDEM 2017
 
1.v on neuman machine
1.v on neuman machine1.v on neuman machine
1.v on neuman machine
 
Real-time Change Detection & Automatic Network Response
Real-time Change Detection & Automatic Network ResponseReal-time Change Detection & Automatic Network Response
Real-time Change Detection & Automatic Network Response
 
MLPerf an industry standard benchmark suite for machine learning performance
MLPerf an industry standard benchmark suite for machine learning performanceMLPerf an industry standard benchmark suite for machine learning performance
MLPerf an industry standard benchmark suite for machine learning performance
 
Data race
Data raceData race
Data race
 
Piplining
PipliningPiplining
Piplining
 
Basic Block Scheduling
Basic Block SchedulingBasic Block Scheduling
Basic Block Scheduling
 
resume-XinyuSui
resume-XinyuSuiresume-XinyuSui
resume-XinyuSui
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 
Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic pipline
 
Lect2 organization 2
Lect2 organization 2Lect2 organization 2
Lect2 organization 2
 
Efficient Bytecode Analysis: Linespeed Shellcode Detection
Efficient Bytecode Analysis: Linespeed Shellcode DetectionEfficient Bytecode Analysis: Linespeed Shellcode Detection
Efficient Bytecode Analysis: Linespeed Shellcode Detection
 

Viewers also liked

Block Cipher
Block CipherBlock Cipher
Block Cipher
Brandon Byungyong Jo
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentationdegarden
 
Practical cryptanalysis for hackers
Practical cryptanalysis for hackersPractical cryptanalysis for hackers
Practical cryptanalysis for hackers
Hacks in Taiwan (HITCON)
 

Viewers also liked (6)

Ciphers
CiphersCiphers
Ciphers
 
Project lfsr
Project lfsrProject lfsr
Project lfsr
 
LFSR
LFSRLFSR
LFSR
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentation
 
Practical cryptanalysis for hackers
Practical cryptanalysis for hackersPractical cryptanalysis for hackers
Practical cryptanalysis for hackers
 

Similar to Exploiting parallelism opportunities in non-parallel architectures to improve NLFSR software implementations

LUT-Network Revision2 -English version-
LUT-Network Revision2 -English version-LUT-Network Revision2 -English version-
LUT-Network Revision2 -English version-
ryuz88
 
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...
Databricks
 
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
Eleni Trouva
 
CA UNIT III.pptx
CA UNIT III.pptxCA UNIT III.pptx
CA UNIT III.pptx
ssuser9dbd7e
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CanSecWest
 
Architecture of TPU, GPU and CPU
Architecture of TPU, GPU and CPUArchitecture of TPU, GPU and CPU
Architecture of TPU, GPU and CPU
GlobalLogic Ukraine
 
Multiprocessor Architecture for Image Processing
Multiprocessor Architecture for Image ProcessingMultiprocessor Architecture for Image Processing
Multiprocessor Architecture for Image Processing
mayank.grd
 
FPGA_Logic.pdf
FPGA_Logic.pdfFPGA_Logic.pdf
FPGA_Logic.pdf
wafawafa52
 
KSpeculative aspects of high-speed processor design
KSpeculative aspects of high-speed processor designKSpeculative aspects of high-speed processor design
KSpeculative aspects of high-speed processor design
ssuser7dcef0
 
Post-processing SAR images on Xeon Phi - a porting exercise
Post-processing SAR images on Xeon Phi - a porting exercisePost-processing SAR images on Xeon Phi - a porting exercise
Post-processing SAR images on Xeon Phi - a porting exercise
Intel IT Center
 
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksFrenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow Networks
Open Networking Summits
 
Netlink-Optimization.pptx
Netlink-Optimization.pptxNetlink-Optimization.pptx
Netlink-Optimization.pptx
KalimuthuVelappan
 
openLEON
openLEONopenLEON
Understand and Harness the Capabilities of Intel® Xeon Phi™ Processors
Understand and Harness the Capabilities of Intel® Xeon Phi™ ProcessorsUnderstand and Harness the Capabilities of Intel® Xeon Phi™ Processors
Understand and Harness the Capabilities of Intel® Xeon Phi™ Processors
Intel® Software
 
SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)
SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)
SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)
Yuuki Takano
 
asap2013-khoa-presentation
asap2013-khoa-presentationasap2013-khoa-presentation
asap2013-khoa-presentationAbhishek Jain
 
Netmap presentation
Netmap presentationNetmap presentation
Netmap presentation
Amir Razmjou
 
Real time Linux
Real time LinuxReal time Linux
Real time Linux
navid ashrafi
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
TEST Huddle
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPF
Alex Maestretti
 

Similar to Exploiting parallelism opportunities in non-parallel architectures to improve NLFSR software implementations (20)

LUT-Network Revision2 -English version-
LUT-Network Revision2 -English version-LUT-Network Revision2 -English version-
LUT-Network Revision2 -English version-
 
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on G...
 
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
 
CA UNIT III.pptx
CA UNIT III.pptxCA UNIT III.pptx
CA UNIT III.pptx
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
 
Architecture of TPU, GPU and CPU
Architecture of TPU, GPU and CPUArchitecture of TPU, GPU and CPU
Architecture of TPU, GPU and CPU
 
Multiprocessor Architecture for Image Processing
Multiprocessor Architecture for Image ProcessingMultiprocessor Architecture for Image Processing
Multiprocessor Architecture for Image Processing
 
FPGA_Logic.pdf
FPGA_Logic.pdfFPGA_Logic.pdf
FPGA_Logic.pdf
 
KSpeculative aspects of high-speed processor design
KSpeculative aspects of high-speed processor designKSpeculative aspects of high-speed processor design
KSpeculative aspects of high-speed processor design
 
Post-processing SAR images on Xeon Phi - a porting exercise
Post-processing SAR images on Xeon Phi - a porting exercisePost-processing SAR images on Xeon Phi - a porting exercise
Post-processing SAR images on Xeon Phi - a porting exercise
 
Frenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow NetworksFrenetic: A Programming Language for OpenFlow Networks
Frenetic: A Programming Language for OpenFlow Networks
 
Netlink-Optimization.pptx
Netlink-Optimization.pptxNetlink-Optimization.pptx
Netlink-Optimization.pptx
 
openLEON
openLEONopenLEON
openLEON
 
Understand and Harness the Capabilities of Intel® Xeon Phi™ Processors
Understand and Harness the Capabilities of Intel® Xeon Phi™ ProcessorsUnderstand and Harness the Capabilities of Intel® Xeon Phi™ Processors
Understand and Harness the Capabilities of Intel® Xeon Phi™ Processors
 
SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)
SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)
SF-TAP: Scalable and Flexible Traffic Analysis Platform (USENIX LISA 2015)
 
asap2013-khoa-presentation
asap2013-khoa-presentationasap2013-khoa-presentation
asap2013-khoa-presentation
 
Netmap presentation
Netmap presentationNetmap presentation
Netmap presentation
 
Real time Linux
Real time LinuxReal time Linux
Real time Linux
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPF
 

More from GreenLSI Team, LSI, UPM

LSI Seminar on Marina Zapater's PhD Thesis
LSI Seminar on Marina Zapater's PhD ThesisLSI Seminar on Marina Zapater's PhD Thesis
LSI Seminar on Marina Zapater's PhD Thesis
GreenLSI Team, LSI, UPM
 
A Cyber Physical Approach to a Combined Hardware-Software
A Cyber Physical Approach to a Combined Hardware-Software A Cyber Physical Approach to a Combined Hardware-Software
A Cyber Physical Approach to a Combined Hardware-Software
GreenLSI Team, LSI, UPM
 
JPAR 2013: On the leakage-power modeling for optimal server operation
JPAR 2013: On the leakage-power modeling for optimal server operationJPAR 2013: On the leakage-power modeling for optimal server operation
JPAR 2013: On the leakage-power modeling for optimal server operationGreenLSI Team, LSI, UPM
 
Optimización energética de centros de datos aprovechando el conocimiento de l...
Optimización energética de centros de datos aprovechando el conocimiento de l...Optimización energética de centros de datos aprovechando el conocimiento de l...
Optimización energética de centros de datos aprovechando el conocimiento de l...
GreenLSI Team, LSI, UPM
 
Energy Efficiency in Data Centers
Energy Efficiency in Data CentersEnergy Efficiency in Data Centers
Energy Efficiency in Data Centers
GreenLSI Team, LSI, UPM
 
Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...
GreenLSI Team, LSI, UPM
 
Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...
Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...
Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...
GreenLSI Team, LSI, UPM
 
GreenDisc: A HW/SW energy optimization framework in globally distributed comp...
GreenDisc: A HW/SW energy optimization framework in globally distributed comp...GreenDisc: A HW/SW energy optimization framework in globally distributed comp...
GreenDisc: A HW/SW energy optimization framework in globally distributed comp...
GreenLSI Team, LSI, UPM
 
Proactive and reactive thermal optimization techniques to improve energy effi...
Proactive and reactive thermal optimization techniques to improve energy effi...Proactive and reactive thermal optimization techniques to improve energy effi...
Proactive and reactive thermal optimization techniques to improve energy effi...
GreenLSI Team, LSI, UPM
 

More from GreenLSI Team, LSI, UPM (9)

LSI Seminar on Marina Zapater's PhD Thesis
LSI Seminar on Marina Zapater's PhD ThesisLSI Seminar on Marina Zapater's PhD Thesis
LSI Seminar on Marina Zapater's PhD Thesis
 
A Cyber Physical Approach to a Combined Hardware-Software
A Cyber Physical Approach to a Combined Hardware-Software A Cyber Physical Approach to a Combined Hardware-Software
A Cyber Physical Approach to a Combined Hardware-Software
 
JPAR 2013: On the leakage-power modeling for optimal server operation
JPAR 2013: On the leakage-power modeling for optimal server operationJPAR 2013: On the leakage-power modeling for optimal server operation
JPAR 2013: On the leakage-power modeling for optimal server operation
 
Optimización energética de centros de datos aprovechando el conocimiento de l...
Optimización energética de centros de datos aprovechando el conocimiento de l...Optimización energética de centros de datos aprovechando el conocimiento de l...
Optimización energética de centros de datos aprovechando el conocimiento de l...
 
Energy Efficiency in Data Centers
Energy Efficiency in Data CentersEnergy Efficiency in Data Centers
Energy Efficiency in Data Centers
 
Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...
 
Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...
Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...
Eficiencia Energética Más Allá Del PUE: Explotando el Conocimiento de la Apli...
 
GreenDisc: A HW/SW energy optimization framework in globally distributed comp...
GreenDisc: A HW/SW energy optimization framework in globally distributed comp...GreenDisc: A HW/SW energy optimization framework in globally distributed comp...
GreenDisc: A HW/SW energy optimization framework in globally distributed comp...
 
Proactive and reactive thermal optimization techniques to improve energy effi...
Proactive and reactive thermal optimization techniques to improve energy effi...Proactive and reactive thermal optimization techniques to improve energy effi...
Proactive and reactive thermal optimization techniques to improve energy effi...
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 

Exploiting parallelism opportunities in non-parallel architectures to improve NLFSR software implementations

  • 1. Exploiting parallelism opportunities in non-parallel architectures to improve NLFSR software implementations Pedro Malagón Juan-Mariano de Goyeneche José M. Moya 1 / 20
  • 2. Context • Remote Keyless Entry Systems (RKE) – Small communications – Two sides of communication know state – Knowing previous state/message provides no information of next state/message (ideally) 2
  • 3. Global goal 3 • Automatic generation of different implementations of the same encryption algorithm • Random execution of implementations in order to introduce variability that increases resistance against Side-Channel Attacks
  • 4. LFSR (I) • Linear Feedback Shift Registers • Implementation – Very simple in Hardware – One-bit at a time in Software 4
  • 5. LFSR (II) • Pros: – Pseudo-random sequence – Long period: n-bits → 2n – Simple implementation • Cons: – Berlekamp-Massey algorithm • Observing 2n gives complete information of LFSR 5
  • 6. NLFSR (I) • Add non linearity to improve security • Non-Linear Feedback Shift Registers 6
  • 7. NLFSR (II) • Implementation – Focus on the NLF – bit LUT – Run-time computed: ANF – Automatically detection of ci values 7 { } { } ( ) ∑ − = −− − ••••= → 12 0 11010 110 ,, 1,01,0 n n i i n ii in n xxxcxxf KK
  • 8. Concrete goal 8 • Goal: different implementations potentially automatic • Two completley different implementations: – ANF based and LUT based • ANF drawbacks – Too many run-time operations (boolean) • Optimization of ANF based implementations
  • 9. Round processing • Feedback inputs can be available • Available processing capabilities – min (j - i, n) n-bit ALU, j-bit data, i bit – Similar to MMX in AES implementations 9 round i+1 round i+1
  • 10. LLVM Passes 10 • ANF implementation • DAG building • CFG generation • Masking meta → valid bits • Instruction scheduling (maximize bits) • Loop instruction motion → Nested loops – Power of two step
  • 11. Test case 11 • KeeLoq in MSP430 (16-bit) • Inputs: d0, d1, d9, d16, d20, d26, d31, k0 • Data: 32-bits
  • 12. Experimental 12 • Compare 5 implementations – 3 LUT based – tb041: official PIC implementation – nlf_tb041: mask calculation – gen_tb041: official generic Microchip – 2 ANF based – bin_ops: one bit at a time – par_bin_ops: applying optimizer 16-round processing < 33 Setup output
  • 17. Conclusions 17 • Worst case – Cycles improvement: 2.45 – Code size grows in 2.27 • Automatically generated
  • 18. Thank you 18 Thank you for coming Any questions?