Design and Implementation of Lightweight and Secure Cryptographic Algorithms for Embedded Devices Lama Sleem
Total Page:16
File Type:pdf, Size:1020Kb
Design and implementation of lightweight and secure cryptographic algorithms for embedded devices Lama Sleem To cite this version: Lama Sleem. Design and implementation of lightweight and secure cryptographic algorithms for embedded devices. Cryptography and Security [cs.CR]. Université Bourgogne Franche-Comté, 2020. English. NNT : 2020UBFCD018. tel-03101356 HAL Id: tel-03101356 https://tel.archives-ouvertes.fr/tel-03101356 Submitted on 7 Jan 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE` DE DOCTORAT DE L’ETABLISSEMENT´ UNIVERSITE´ BOURGOGNE FRANCHE-COMTE´ PREPAR´ EE´ A` L’UNIVERSITE´ DE FRANCHE-COMTE´ Ecole´ doctorale n°37 Sciences Pour l’Ingenieur´ et Microtechniques Doctorat d’Informatique par LAMA SLEEM Design and implementation of lightweight and secure cryptographic algorithms for embedded devices Conception et implementation´ d’algorithmes cryptographiques legers´ et securis´ es´ pour dispositifs embarques´ These` present´ ee´ et soutenue a` Belfort, le 17 Janvier 2020 Composition du Jury : OUSSAMA BAZZI PROFESSEUR UNIVERISTE Rapporteur LIBANAISE PIERRE SPITERI PROFESSEUR ENSEEIHT Rapporteur CHRISTOPHE GUYEUX PROFESSEUR Universite´ Bourgogne Examinateur Franche-Comte´ FLAVIEN VERNIER MAˆITRE DE CONFERENCES´ Universite´ Savoie Examinateur Mont Blanc RAPHAEL¨ COUTURIER PROFESSEUR Universite´ Bourgogne Directeur de these` Franche-Comte´ N◦ X X X école doctorale sciences pour l’ingénieur et microtechniques Title: Design and implementation of lightweight and secure cryptographic algorithms for embedded devices Keywords: Image encryption, Encryption, Decryption, Confusion, Diffusion, dynamic key, Security tests. Abstract: Living in an era where new devices are astonishing considering their high capabilities, shedding the light over different aspects this platform possesses. new visions and terms have emerged. Moving to smart phones, Wireless Sensor Then, in order to propose any new security solution and validate its robustness and the Networks, high-resolution cameras, pads and much more, has mandated the need level of randomness of the ciphered image, a simple and efficient test is proposed. This to rethink the technological strategy that is used today. Starting from social media, test proposes using the randomness tools, TestU01 and Practrand, in order to assure a where apparently everything is being exposed, moving to highly powerful surveillance high level of randomness. After running these tests on well known ciphers, some flaws cameras, in addition to real time health monitoring, it can be seen that a high amount were exposed. of data is being stored in the Cloud and servers. This introduced a great challenge Proceeding to the next part, a novel proposal for enhancing the well-known ultra for their storage and transmission especially in the limited resourced platforms that are lightweight cipher scheme, Speck, is proposed. The main contribution of this work characterized by: (a) limited computing capabilities, (b) limited energy and source of is to obtain a better version compared to Speck. In this proposal, 26 rounds in Speck power and (c) open infrastructures that transmit data over wireless unreliable networks. were reduced to 7 rounds in Speck-R while enhancing the execution time by at least One of the extensively studied platforms is the Vehicular Ad-hoc Networks which tends 50%. First, we validate that Speck-R meets the randomness tests that are previously to have many limitations concerning the security field. proposed. Additionally, a dynamic substitution layer adds more security against key In this dissertation, we focus on improving the security of transmitted multimedia related attacks and highly fortifies the cipher. Speck-R was implemented on different contents in different limited platforms, while preserving a high security level. Limitations limited arduino chips and in all cases, Speck-R was ahead of Speck. of these platforms are taken into consideration while enhancing the execution time of the Then, in order to prove that this cipher can be used for securing images, especially secure cipher. Additionally, if the proposed cipher is to be used for images, the intrinsic in VANETS/IoV, where images can be extensively re/transmitted, several tests were voluminous and complex nature of the managed images is also taken into account. exerted and results showed that Speck-R indeed possesses the high level of security In the first part, we surveyed one of the limited platforms that is interesting for many desired in any trusted cipher. Extensive experiments validate our proposal from researchers, which is the Vehicular Ad-hoc Networks. In order to pave the way for both security and performance point of views and demonstrate the robustness of the researchers to find new efficient security solutions, it is important to have one reference proposed scheme against the most-known types of attacks. that can sum most of the recent works. It almost investigates every aspect in this field Titre : Design and implementation of lightweight and secure cryptographic algorithms for embedded devices Mots-cles´ : Chiffrement d’images, Chiffrement, Dechiffrement,´ Confusion, Diffusion, dynamique Tests de securit´ e.´ Resum´ e´ : Nous vivons actuellement dans une ere` avec sans cesse de nouveaux appareils nombres pseudo aleatoires,´ TestU01 et Practrand. Apres` avoir effectue´ ces tests sur technologiques (smartphone, reseaux´ de capteurs sans fil, aux cameras´ haute des algorithmes de chiffrement bien connus, certaines failles ont et´ e´ exposees´ et une resolution,´ etc). En partant des medias´ sociaux, en passant par des cameras´ de nouvelle proposition visant a` ameliorer´ le systeme` de chiffrement ultra-leger´ Speck est surveillance tres` puissantes, et sans oublier la surveillance de la sante´ en temps proposee.´ La principale contribution de ce travail est d’obtenir une meilleure version reel,´ on constate qu’une grande quantite´ de donnees´ est stockee´ dans le cloud et par rapport a` Speck. Dans cette nouvelle proposition, appelee´ Speck-R, nous utilisons les serveurs. Cela represente´ un grand defi´ de stockage et de transmission, en seulement 7 iterations´ contrairement a` Speck qui en utilise 26 et nous reduisons´ le particulier dans les plates-formes aux ressources limitees´ qui sont caracteris´ ees´ par temps d’execution´ d’au moins 50%. Tout d’abord, nous validons que Speck-R repond´ : (a) des capacites´ de calcul limitees,´ (b) une source d’energie´ limitees´ et (c) des aux tests de statistiques pour mesurer l’aleatoire,´ proposes´ prec´ edemment.´ De plus, infrastructures ouvertes qui transmettent des donnees´ sur des reseaux´ sans fil peu nous avons rajoute´ un systeme` de cle´ dynamique qui procure plus de securit´ e´ contre les fiables. Dans cette these,` nous nous concentrons sur l’amelioration´ de la securit´ e´ des attaques liees´ a` la cle.´ Speck-R a et´ e´ implement´ e´ sur differentes´ cartes de type arduino contenus multimedia´ transmis sur des plates-formes a` capacite´ de calcul limitee,´ tout et dans tous les cas, Speck-R etait´ plus rapide que Speck. Ensuite, afin de prouver que en preservant´ un niveau de securit´ e´ elev´ e.´ Dans la premiere` partie, nous avons etudi´ e´ ce chiffrement peut etreˆ utilise´ pour securiser´ les images, en particulier dans les reseaux´ les reseaux´ ad hoc vehiculaire.´ Nous avons propose´ un etat´ de l’art qui permet de VANETS/IoV, plusieurs tests ont et´ e´ effectues´ et les resultats´ montrent que Speck- resumer´ la plupart des travaux recents´ et d’explorer presque tous les aspects de ce R possede` effectivement le haut niveau de securit´ e´ souhaite.´ Des experimentations´ domaine en illustrant les differents´ aspects que possede` cette plateforme. Ensuite, afin valident notre proposition du point de vue de la securit´ e´ et de la performance et de proposer une nouvelle solution de securit´ e´ et de valider sa robustesse et le niveau de demontrent´ la robustesse du systeme` propose´ face aux types d’attaques les plus caractere` aleatoire´ d’une image chiffree,´ nous avons propose´ un test simple et efficace. connus. Celui-ci est base´ sur des outils pour tester statistiquement le caractere` aleatoire´ de Universite´ Bourgogne Franche-Comte´ 32, avenue de l’Observatoire 25000 Besanon, France ABSTRACT Design and implementation of lightweight and secure cryptographic algorithms for embedded devices Lama SLEEM University of Bourgogne Franche Comte,´ 2020 Supervisor:Raphael¨ COUTURIER Living in an era where new devices are astonishing considering their high capabilities, new visions and terms have emerged. Moving to smart phones, Wireless Sensor Net- works, high-resolution cameras, pads and much more, has mandated the need to rethink the technological strategy that is used today. Starting from social media, where appar- ently everything is being exposed, moving to highly powerful surveillance cameras, in addition to real time health monitoring, it can be seen that a high amount of data is being stored in the Cloud and servers. This introduced a great challenge for their storage