<<

NIST Lightweight Workshop 2015

Japan CRYPTREC Acvity on Lightweight Cryptography

Shiho Moriai

NICT CRYPTREC

1 Outline

• CRYPTREC • Lightweight Cryptography (LWC) WG • Scope of LWC in CRYPTREC • Advantages and Restricons of LWC • LWC for of Things • Plan

2 CRYPTREC

Cryptography Research and Evaluation Committees – Project to evaluate and monitor the security of cryptographic techniques used in Japanese e- Government systems • Goal of the project – To ensure the security of Japanese e-Government systems by using secure cryptographic techniques and to realize a secure IT society.

3 of CRYPTREC

CRYPTREC launch, Call for cryptographic techniques Publicaon of the e-Government Recommended List “Policy for the use of ciphers in informaon system procurement of each governmental agency” was approved 2000 2003

2009 2013

Call for cryptographic techniques for the revision of the e-Government Recommended Ciphers List Publicaon of the CRYPTREC Ciphers List

4 Three Lists in the CRYPTREC Ciphers List

• 電子政府推奨暗号リストe-Government Recommended Ciphers List – Recommended ciphers approved by CRYPTREC in terms of security and implementaon aspects as well as current and future market deployment.

• 推奨候補暗号リストCandidate Recommended Ciphers List – Candidate recommended ciphers approved by CRYPTREC in terms of security and implementaon aspects.

Monitored Ciphers List l – The ciphers are not-recommended for use because of high risk of compromise while they are allowed to use only for interoperability with legacy systems.

5 CRYPTREC Ciphers List 電子政府推奨暗号リスト e-Government Recommended Ciphers List

Classificaon DSA ECDSA Signature RSA-PSS Public ciphers RSASSA-PKCS1-v1_5 Confidenality RSA-OAEP DH ECDH 64- block ciphers 3-key Triple DES AES Symmetric key ciphers 128-bit block ciphers Stream ciphers KCipher-2 SHA-256 Hash funcons SHA-384 SHA-512 CBC CFB Encrypon modes CTR Modes of operaon OFB

Authencated encrypon CCM modes GCM CMAC Message authencaon HMAC ISO/IEC 9798-2 Enty authencaon 6 ISO/IEC 9798-3 CRYPTREC Ciphers List 推奨候補暗号リスト Candidate Recommended Ciphers List • Key exchange – PSEC-KEM • 64-bit block ciphers – CIPHERUNICORN-E, -L1, MISTY1 • 128-bit block ciphers – CIPHERUNICORN-A, CLEFIA, Hierocrypt-3, SC2000 • Stream ciphers – Enocoro-128v2, MUGI, MULTI-S01 • MAC – PC-MAC-AES • Enty Authencaon

– ISO/IEC 9798-4 7 CRYPTREC Ciphers List Monitored Ciphers List

• Public-key Encrypon – RSAES-PKCS1-v1_5 • – 128-bit key RC4 • Hash funcons – RIPEMD-160, SHA-1 • MAC – CBC-MAC

8 CRYPTREC Organizaon

Management Standards for Informaon Security Measures for the Central Government Systems

hp://www..go.jp/system.htm 9 Lightweight Cryptography (LWC) WG

• Goal – LWC WG started in 2013 so that appropriate lightweight cryptography can be selected and procured for e-government systems and any applicaons where they are required.

• Acvies – Survey and research on state of the art in LWC – Research on applicaons of LWC – Implementaon evaluaon – Discussion of future plan – Publish reports as deliverables

10 LWC WG Commiee Members

Chair Naofumi Homma Tohoku Univ. Kazumaro Aoki NTT Tetsu Iwata Nagoya Univ. Kazuto Ogawa NHK & Research Lab. Kazuo Sakiyama The Univ. of Electro-Communicaons Kyoji Shibutani Corporaon Daisuke Suzuki Corporaon Yuichiro Nariyoshi Renesas Electric Corporaon Kazuhiko Minematsu NEC Corporaon Hideyuki Miyake Corporaon Dai Watanabe , Ltd.

11 Scope of LWC in CRYPTREC

• “Cryptographic primitives with advantages (lightweight properties) over existing cryptographic primitives in specific efficiency measures admitting tradeoffs between efficiency and security” Typical efficiency measures for LWC

Efficiency measures Applicaon examples Hardware Gate Count (Power, Cost) RFID, Low-cost sensors Implementaon Energy Medical/healthcare devices, baery-powered devices Latency Memory encrypon, In- devices, Industrial control systems Soware Memory (ROM/RAM) Consumer electronics, Sensors, In-

Implementaon vehicle devices 12 Advantages of LWC

• Difference between LWC and AES (a few kgates) is Gate Count crical in small chips e.g. 50μm chips and in mature process e.g. 180nm-350nm CMOS.

• As gate count is small, power/energy consumpon is Energy small. LWC is expected to relax requirements on power/ energy consumpon.

• There exists a lightweight primive which achieves twice lower latency of AES with 1/10 gate counts (encrypts in < Latency 10ns with 20kgate). Useful in applicaons where real- me response in the order of microseconds is required, e.g. industrial control systems. • There exists a lightweight primive which can be implemented within ¼ ROM of AES. There exist cases Memory where only LWC can be implemented or a cheaper microprocessor can be adopted. 13 Implementaon evaluaon of LW block ciphers

• Aim – Evaluate using the same interface and plaorm for a fair comparison. • Target – AES, Camellia, CLEFIA, PRESENT, LED, Piccolo, TWINE, • Plaorm and Efficiency measures – H/W implementaon • Standard CMOS cell library:NANGATE Open Cell Library (45nm CMOS) • 3 Architectures: Unrolled, Round, Serial implementaons • Measures:Max Frequency, Throughput, Gate counts, Latency, Power, Peak power, Leak power – Embedded S/W implementaon • Processor: RL78 (16bit microcontroller) • Measures:Speed, RAM size, ROM size 14

Restricons of LWC (and Countermeasures)

• Security provided by LWC – Some lightweight cryptographic primives are designed to have advantages (lightweight properes) in specific efficiency measures, so their security turn out to be sacrificed. – For example, for 64-bit block ciphers, a secret key should be changed aer 232 block encrypons (32GB). – However, there exist some countermeasures and special modes for beyond the “birthday bound” security.

15 (IoT)

Everything is connected.

16 IoT: Number of connected objects

26 bn by 2020 30 bn by 2020 50 bn by 2020 2000 bn by 2020

Current standard security soluon can not be implemented on all the connected objects!

17 LWC for IoT

• In the IoT , where 1000 bn sensors and 50 bn objects are connected, crypto techniques will be required for devices with low-end micro controllers. • Crypto techniques will be implemented on more devices – not implemented at . LWC can relax implementaon requirements. – Automove: Autonomous cars – Industrial control system: factories and plants are connected to clouds.

18 Hearing of Opinions on LWC Applicaons

• “Informaon security technologies for automove” – Hisashi Oguma, Toyota InfoTechnology Center • Many ECUs are embedded in a car. • LWC can be useful for improving CAN security (data payload is 8 byte). • “Study of requirements for cryptographic technology for control systems” – Toru Ohwada, Hitachi Ltd. • Extract requirements for cryptographic technology for control systems from real problems. • LWC with low-latency, low-cost, support for flexible data size will be useful. with low resource and support for easy change of algorithms/key sizes will be helpful.

19 Contents of the CRYPTREC Report on LWC

1. Execuve Summary – Scope – Advantages over exisng cryptographic techniques – Restricons (Security provided by lightweight primives) – Future plan proposal 2. Survey of lightweight cryptographic primives (security & implementaon aspects) – Overview – Lightweight block ciphers – Lightweight stream ciphers Available at – Lightweight hash funcons CRYPTREC Web – Lightweight MACs – Authencated encrypon 20

Contents of the CRYPTREC Report on LWC (Cont.)

3. Survey of new trends related to lightweight cryptography – Low latency cryptography – Side channel aacks and countermeasures – CAESAR compeon – Applicaon examples and standardizaon 4. Hearing of opinions on lightweight cryptography applicaons from users 5. Benchmarking of lightweight block ciphers in embedded soware and hardware Available at CRYPTREC Web

21 Future Plan

• Deliver a guideline on lightweight cryptography – describes advantages and restricons of LWC – shows security and performance evaluaon/ comparison results – so that it facilitates easy selecon of appropriate lightweight cryptographic primives for users and promoon of LWC

22 Conclusion

• Introduced Japan CRYPTREC acvity on LWC. • Since LWC is expected to play an important role in IoT security, CRYPTREC will provide a guideline on LWC for users’ easy selecon of appropriate lightweight cryptographic primives and promoon of LWC. • CRYPTREC Report 2014 is available from below: hp://cryptrec.go.jp/english/topics/cryptrec_20150716_c14report.html

23