4.4. Elección De Algoritmos Criptográficos

Total Page:16

File Type:pdf, Size:1020Kb

4.4. Elección De Algoritmos Criptográficos (')%%*+(%%% ,)#+(-.% (()(/0&) 10(()))(%).)')#2 1((% #$% &' ii RESUMEN Vivimos un momento en el que cada vez más objetos de uso común llevan aso- ciado un microcontrolador, lo que permite a dichos objetos establecer redes de co- municaciones entre ellos y con Internet. Es la llamada internet de las cosas (IoT por sus siglas en inglés). Sus aplicaciones van desde el control doméstico de temperatura hasta la automatización de procesos industriales. Tal ubicuidad plantea la cuestión del elevado impacto que podría tener un ataque realizado con éxito sobre esta clase de redes. Por otra parte, dada la limitada potencia de algunos de los microcontrola- dores, no es factible la aplicación de soluciones clásicas de la criptografía, tales como la infraestructura de clave pública (PKI). La información de los sensores y los comandos que se envían a los actuadores generalmente no necesitan ser privados, pero es peligroso no autenticar la informa- ción y, sobre todo, los comandos. Es importante recordar que se trata de sistemas Ciberfísicos: microcontroladores que gobiernan objetos físicos, por lo que un ataque podría causar daños a objetos o incluso a personas. El objetivo de este trabajo es diseñar e implementar un protocolo de autentica- ción que asegure que un mensaje recibido procede de un dispositivo legítimo y que fue enviado en un rango de tiempo concreto. Se pretende conseguir esto utilizando la mínima potencia de cómputo posible. iii iv RESUMEN ABSTRACT We live in a moment in which more and more objects of common use ara associa- ted with a microcontroller. This fact allows these objects to establish communication networks between them and with the Internet. These networks form the so-called In- ternet of Things (IoT). Its applications range from domestic temperature control to the automation of industrial processes. Such ubiquity raises the question of the high impact a succesful attack would have on this type of networks. In addition, given the limited power of some microcontrollers, the application of classical cryptography solutions, such as public key infrastructure (PKI), become infeasible. The information from sensors and the commands sent to actuators do not need to be private. However, it is dangerous not to authenticate the information and, above all, the commands. It is important to keep in mind that these microcontrollers are attached to physical objects and, because of that, an attack coud harm objects or even people. The target of this work is to design and implement an authentication protocol. That is, to ensure that a received message comes from a legitimate device and that it was sent in a fixed range of time. Moreover, it is intended to achive that using the lowest possible computing power. v vi ABSTRACT Índice general RESUMEN III ABSTRACT V 1. Introducción 1 1.1. Notación .................................. 2 2. ESTADO DEL ARTE 3 2.1. Criptografía ................................ 3 2.1.1. Criptografía simétrica ...................... 3 2.1.2. Funciones de derivación de claves ................ 7 2.2. Modelo OSI ................................ 8 2.3. Microcontroladores y sistemas de control ................ 10 2.3.1. Arquitecturas de microcontroladores .............. 11 2.4. Internet of Things ............................. 12 2.4.1. Raspberry Pi Zero W ....................... 13 2.4.2. ESP32 ............................... 13 2.5. Comunicación por radio ......................... 14 2.5.1. Modulación digital ........................ 14 2.5.2. Protocolos wireless ........................ 17 vii viii ÍNDICE GENERAL 3. ESCENARIO DE TRABAJO 21 3.1. Objetivo .................................. 21 3.2. Topología de la red . ........................... 22 3.3. Atacante .................................. 24 4. SOLUCION PROPUESTA 25 4.1. Alta de un nodo .............................. 26 4.2. Operación del nodo ............................ 27 4.2.1. Formato del mensaje ....................... 27 4.2.2. Firmado del mensaje ....................... 28 4.2.3. Comprobación de la firma .................... 29 4.2.4. Resincronización del contador .................. 30 4.3. Baja de un nodo ............................. 31 4.4. Elección de algoritmos criptográficos .................. 31 4.4.1. Longitud de las claves ...................... 33 4.5. Limitaciones ................................ 33 4.6. Pruebas .................................. 34 5. CONCLUSIONES Y LÍNEAS FUTURAS 39 5.1. Conclusiones ................................ 39 5.2. Líneas futuras ............................... 40 Bibliografía 41 Índice de figuras 2.1. Jerarquía de derivación de claves .................... 7 2.2. Comunicación según el modelo OSI con un intermediario a nivel de red 8 2.3. Encapsulación en tres niveles ....................... 9 2.4. Esquema de la arquitectura de Von Neumann ............. 11 2.5. Raspberry Pi Zero ............................ 13 2.6. Módulo ESP32 . ........................... 13 2.7. Modulación de señales en amplitud y frecuencia ............ 15 2.8. Contaminación con ruido de una señal digital ............. 15 2.9. Típica red wifi doméstica ......................... 17 3.1. Topologías de red ............................. 22 3.2. Número de claves en el sistema en función del número de nodos en la red para las distintas topologías ..................... 23 3.3. Número máximo de saltos que debe dar un mensaje en función del número de nodos en la red para las distintas topologías ........ 23 4.1. Intercambio de mensajes en el alta de un nuevo nodo ......... 26 4.2. Formato del mensaje ........................... 27 4.3. Intercambio de mensajes en el alta de un nuevo nodo. Fuente: Google 32 4.4. Escenario para las pruebas del protocolo ................ 34 ix x ÍNDICE DE FIGURAS 4.5. Trama correcta .............................. 35 4.6. Trama con el contador erróneo ...................... 36 4.7. Trama de sincronización ......................... 36 4.8. Paquete capturado por el atacante y que será modificado ....... 36 4.9. Paquete modificado por el atacante ................... 36 4.10. Paquete correcto ............................. 37 4.11. Paquetes involucrados en el ataque por repetición ........... 37 4.12. Paquete repetido en el ataque por repetición .............. 37 4.13. Trama de sincronización ......................... 37 Índice de tablas 1.1. Tabla de verdad del operador XOR ................... 2 2.1. Resumen de algoritmos de cifrado simétrico .............. 5 2.2. Tamaño del payload en LoRa según región y frecuencia ........ 18 4.1. Comparación entre ChaCha20 y AES256 ................ 32 xi xii ÍNDICE DE TABLAS Capítulo 1 Introducción Con el auge de la Internet of Things, las redes de sensores y actuadores con- trolados por dispositivos de bajo consumo están a la orden el día. Cuando estos dispositivos utilizan un cable como medio de transmisión de sus comunicaciones y se tiene un control sobre qué dispositivos están conectados, basta un control de ac- ceso físico a dicho cable para proveer de seguridad al sistema. Tal control puede no tener una implementación trivial, pero cuando el medio de transmisión son ondas de radio es muy difícil, cuando no imposible, implementarn medidas de seguridad análogas a la protección de un cable. Por otra parte, la transmisión mediante ondas de radio es más barata y sencilla en cuanto a que no requiere extender un cable entre los dos nodos que participan en la comunicación, y a que puede llegar a cubrir largas distancias con una inversión mínima en infraestructura. Así, está claro que las ondas de radio como canal ofrecen ventajas suficientes como para utilizarlas en algunas de las redes que pueden formar esta Internet of Things. Volviendo al problema de la seguridad, queda descartada la aplicación del mismo principio de control de acceso físico que se podría aplicar a redes cableadas, puesto que con una antena no es posible averiguar ni cuántos dispositivos captan una señal que ha emitido ni qué dispositivo ha emitido una señal que haya captado. Así, hay que encontrar un mecanismo para asegurar la autenticidad de los mensajes recibidos y que parta de la suposición de que un atacante puede leer todos los mensajes que pasen por el canal e introducir mensajes nuevos sin que estos sean, en principio, diferenciables de un mensaje legítmo. Está claro que este mecanismo no puede pasar por la aplicación de un control sobre el canal, por lo que debe aplicar cambios en el mensaje de forma que, una vez recibido, sea posible verificar que este mensaje es legítimo. La manera de solucionar este problema pasa necesariamente por la aplicación de funciones criptográficas al mensaje, de forma que sólo aquellos que demuestren conocer un secreto, esto es, la clave, sean considerados como emisores legítimos en la comunicación. 1 2 CAPÍTULO 1. INTRODUCCIÓN 1.1. Notación Los operadores no estándar utilizados en las fórmulas que se encuentran a lo largo de este trabajo son los siguientes: ⊕: Operador de or exclusivo o XOR, operación lógica bit a bit cuya tabla de verdad se muestra en la tabla 1.1 Tabla 1.1: Tabla de verdad del operador XOR ABA⊕ B 00 0 01 1 10 1 11 0 ||: Operador de concatenación, consiste en añadir el operando derecho a la representación del izquierdo. Por ejemplo: 0011||1100 = 00111100 (x)16: Representación hexadecimal, significa que el número entre paréntesis está escrito en notación hexadecimal (base 16) en lugar de la notación usual (decimal o base 10). Capítulo 2 ESTADO DEL ARTE 2.1. Criptografía La criptografía estudia un conjunto de técnicas matemáticas para implementar servicios
Recommended publications
  • Deriving Chacha20 Key Streams from Targeted Memory Analysis
    Deriving ChaCha20 Key Streams From Targeted Memory Analysis Peter McLaren, William J Buchanan, Gordon Russell, Zhiyuan Tan School of Computing, Edinburgh Napier University, Edinburgh, UK. Abstract—There can be performance and vulnerability con- keys without impacting the target and for target applications cerns with block ciphers, thus stream ciphers can used as an alter- to be unaware of extraction. native. Although many symmetric key stream ciphers are fairly The rest of the paper is structured as follows. Section II resistant to side-channel attacks, cryptographic artefacts may exist in memory. This paper identifies a significant vulnerability discusses related research including side-channel studies and within OpenSSH and OpenSSL and which involves the discovery background on stream ciphers and ChaCha20 cipher imple- of cryptographic artefacts used within the ChaCha20 cipher. This mentations is presented in Section III. Section IV provides can allow for the cracking of tunneled data using a single targeted relevant details of the framework and its implementation is memory extraction. With this, law enforcement agencies and/or given in Section V. The results are presented and discussed in malicious agents could use the vulnerability to take copies of the encryption keys used for each tunnelled connection. The Section VI and conclusions drawn in Section VII. user of a virtual machine would not be alerted to the capturing of the encryption key, as the method runs from an extraction II. RELATED WORK of the running memory. Methods of mitigation include making This paper focuses on the decrypting network traffic en- cryptographic artefacts difficult to discover and limiting memory crypted with ChaCha20-Poly1305 cipher.
    [Show full text]
  • Arxiv:2002.12439V1 [Quant-Ph]
    Quantum Attacks without Superposition Queries: the Offline Simon’s Algorithm Xavier Bonnetain1,3, Akinori Hosoyamada2,4, Mar´ıaNaya-Plasencia1, Yu Sasaki2, and Andr´eSchrottenloher1 1 Inria, France {xavier.bonnetain,maria.naya plasencia,andre.schrottenloher}@inria.fr 2 NTT Secure Platform Laboratories, Tokyo, Japan {hosoyamada.akinori,sasaki.yu}@lab.ntt.co.jp 3 Sorbonne Universit´e, Coll`ege Doctoral, F-75005 Paris, France 4 Nagoya University, Nagoya, Japan Abstract. In symmetric cryptanalysis, the model of superposition queries has led to surprising results, with many constructions being broken in polynomial time thanks to Simon’s period-finding algorithm. But the practical implications of these attacks remain blurry. In contrast, the re- sults obtained so far for a quantum adversary making classical queries only are less impressive. In this paper, we introduce a new quantum algorithm which uses Simon’s subroutines in a novel way. We manage to leverage the algebraic struc- ture of cryptosystems in the context of a quantum attacker limited to classical queries and offline quantum computations. We obtain improved quantum-time/classical-data tradeoffs with respect to the current liter- ature, while using only as much hardware requirements (quantum and classical) as a standard exhaustive search with Grover’s algorithm. In particular, we are able to break the Even-Mansour construction in quan- tum time O˜(2n/3), with O(2n/3) classical queries and O(n2) qubits only. In addition, we improve some previous superposition attacks by reducing the data complexity from exponential to polynomial, with the same time complexity. Our approach can be seen in two complementary ways: reusing superpo- sition queries during the iteration of a search using Grover’s algorithm, or alternatively, removing the memory requirement in some quantum attacks based on a collision search, thanks to their algebraic structure.
    [Show full text]
  • Elinux Status
    Status of Embedded Linux Embedded Linux Community Update May 2019 Tim Bird Sr. Staff Software Engineer, Sony Electronics Linux Foundation Technical Advisory Board member 1 110/23/2014 PA1 Confidential Nature of this talk… • Quick overview of lots of embedded topics • A springboard for further research • If you see something interesting, you have a link or something to search for • Not comprehensive! • Just stuff that I saw 2 210/23/2014 PA1 Confidential Outline OSS Areas Linux Kernel Technology Areas Conferences Industry News Resources 3 310/23/2014 PA1 Confidential Outline OSS Areas Linux Kernel Technology Areas Conferences Industry News Resources 4 410/23/2014 PA1 Confidential Open Source Areas • Operating Systems • Including Linux • Technology areas • Audio • Graphics • Kernel Coding • Languages • Networking • Security • Testing 510/23/2014 PA1 Confidential Operating Systems • NuttX • Zephyr • Android • Linux 610/23/2014 PA1 Confidential NuttX • Working on first-ever conference • International NuttX Workshop • Gouda, The Netherlands, July 16-17 • Sponsored by Technolution • Sony and NXP are involved • About 70 attendees • Nuttx YouTube channel: • https://www.youtube.com/channel/UC0QciIlcUnj JkL5yJJBmluw • Has intros and tutorials and descriptions of features 710/23/2014 PA1 Confidential Zephyr • Couldn’t find much recent news • Gains Memory Protection (March 2018) • https://www.electronicdesign.com/embedded- revolution/zephyr-iot-os-gains-memory- protection • Support for POSIX APIs • Docs describes config option: CONFIG_POSIX_APIS
    [Show full text]
  • Adiantum: Length-Preserving Encryption for Entry-Level Processors
    Adiantum: length-preserving encryption for entry-level processors Paul Crowley and Eric Biggers Google LLC {paulcrowley,ebiggers}@google.com Abstract. We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound. Our composition Adiantum uses NH, Poly1305, XChaCha12, and a single AES invocation. On an ARM Cortex-A7 processor, Adiantum decrypts 4096-byte messages at 10.6 cycles per byte, over five times faster than AES-256-XTS, with a constant-time implementation. We also define HPolyC which is simpler and has excellent key agility at 13.6 cycles per byte. Keywords: super-pseudorandom permutation · variable input length · tweakable encryption · disk encryption 1 Introduction Two aspects of disk encryption make it a challenge for cryptography. First, performance is critical; every extra cycle is a worse user experience, and on a mobile device a reduced battery life. Second, the ciphertext can be no larger than the plaintext: a sector-sized read or write to the filesystem must mean a sector-sized read or write to the underlying device, or performance will again suffer greatly (as well as, in the case of writes to flash memory, the life of the device). Nonce reuse is inevitable as there is nowhere to store a varying nonce, and there is no space for a MAC; thus standard constructions like AES-GCM are not an option and standard notions of semantic security are unachievable. The best that can be done under the circumstances is a “tweakable super-pseudorandom permutation”: an adversary with access to both encryption and decryption functions who can choose tweak and plaintext/ciphertext freely is unable to distinguish it from a family of independent random permutations.
    [Show full text]
  • The University of Chicago Capitalizing on Security
    THE UNIVERSITY OF CHICAGO CAPITALIZING ON SECURITY, PERFORMANCE, AND ENERGY TRADEOFFS IN FULL DRIVE ENCRYPTION SCHEMES FOR FUN AND PROFIT A DISSERTATION SUBMITTED TO THE FACULTY OF THE DIVISION OF THE PHYSICAL SCIENCES IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF COMPUTER SCIENCE BY BERNARD DICKENS III CHICAGO, ILLINOIS JULY 2020 Copyright c 2020 by Bernard Dickens III All Rights Reserved To my kiddos (whom at the time of writing do not yet exist): I find the courage to peer over the edge of human knowledge and reach down into that abyss of the unknown with the hope that you may one day benefit from my struggles. I can’t wait to meet you! TABLE OF CONTENTS LISTOFFIGURES .................................... vii LISTOFTABLES ..................................... viii ACKNOWLEDGMENTS ................................. ix ABSTRACT ........................................ xi 1 INTRODUCTION ................................... 1 1.1 ThesisStatement ................................. 1 1.2 ProblemDescription .............................. 1 1.3 Contributions ................................... 3 1.3.1 StrongBox................................. 3 1.3.2 SwitchCrypt................................ 3 1.3.3 HASCHK ................................. 3 2 BACKGROUNDANDRELATEDWORK...................... 4 3 STRONGBOX: USING STREAM CIPHERS FOR HIGH PERFORMANCE FULL DRIVEENCRYPTION ................................ 7 3.1 Motivation..................................... 7 3.1.1 PerformancePotential . 10 3.1.2 Append-mostlyFilesystems . 10 3.1.3
    [Show full text]
  • Adiantum: Length-Preserving Encryption for Entry-Level Processors
    Adiantum: length-preserving encryption for entry-level processors Paul Crowley and Eric Biggers Google LLC March 28, 2019 Overview • The problem • The solution Section 1 The problem The problem • Hardware (eg ARM CE) makes AES fast • …but some devices don’t have it The solution (for TLS) • RFC7539 • ChaCha for encryption • Poly1305 for authentication • Much faster But… • RFC7539 is an AEAD mode, so jCj > jPj • nonce • MAC • Storage encryption requires jCj = jPj Full disk encryption • 4KiB virtual sector <-> 4KiB real sector • No special flash hardware File based encryption • Databases update sectors • If read/write of one sector touches two sectors… • Atomicity more difficult • Speed is halved • Lifetime is halved Android Android “Compatibility Definition Document”, version 8.1, section 9.9: If device implementations […] support data storage encryption with Advanced Encryption Standard (AES) crypto performance above 50MiB/sec, they MUST enable the data storage encryption by default […] Section 2 The solution Formal properties • Deterministic • No nonce • Tweakable super-pseudorandom permutation (SPRP) • family of permutations indexed by tweak and length • indistinguishable from random permutations • attacker can query f , f −1 AES-XTS • 128-bit tweakable SPRP • 4KiB sector: applied 256 times • Two-part tweak • Cortex A7: 58.6 cpb (decryption) Whole sector encryption • 4KiB tweakable SPRP • every bit of plaintext affects all of ciphertext • every bit of ciphertext affects all of plaintext • every tweak a new permutation • opportunity to
    [Show full text]
  • Security Now! #701 - 02-12-19 Adiantum
    Security Now! #701 - 02-12-19 Adiantum This week on Security Now! This week we look at Apple's most recent v12.1.4 iOS update and the two 0-day vulnerabilities it closed, as also examine the very worrisome new Android image-display vulnerability, we dive into an interesting "reverse RDP" attack, look at the new LibreOffice & OpenOffice vulnerability, we consider Microsoft's research into the primary source of software vulnerabilities, MaryJo gets an early peek at enterprise pricing for extending Windows 7 support, China and Russia continue their work to take control of their country's Internet, Firefox's resumption of its A/V warning release 65. We then update with a few more SQRL anecdotes, share a bit of listener feedback, then see how Google does the Cha-Cha with their new "Adiantum" ultra-high-performance cryptographic cipher. The Ridiculously Inexpensive PDP11/70 Kit Security News Update your iOS devices to v12.1.4 if you haven't already Aside from fixing the unattended Facetime eavesdropping bug, the 12.1.4 update also forecloses three additional flaws, two of which are being actively exploited in the wild as 0-day exploits. https://thehackernews.com/2019/02/ios-security-update-facetime.html Google's Project Zero researchers found the two 0-days, which they privately disclosed to Apple and Apple discovered and fixed a different flaw relating to Facetime. ● CVE-2019-7286: a memory corruption issue that could allow a malicious application to gain elevated privileges on the vulnerable Apple device. ● CVE-2019-7287: a memory corruption issue that could allow a malicious application to execute arbitrary code with kernel privileges.
    [Show full text]
  • Cryptographic Competitions.Pdf
    Cryptographic competitions Daniel J. Bernstein1;2 1 Department of Computer Science, University of Illinois at Chicago, Chicago, IL 60607–7045, USA 2 Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany [email protected] Abstract. Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in cryptographic competitions, and analyzes the extent to which those procedures reduce security risks. Keywords: cryptography, competitions, DES, AES, eSTREAM, SHA-3, CAESAR, NISTPQC, NISTLWC 1 Introduction The CoV individual reports point out several shortcomings and pro- cedural weaknesses that led to the inclusion of the Dual EC DRBG algorithm in SP 800-90 and propose several steps to remedy them. The VCAT strongly encourages standard development through open competitions, where appropriate. —“NIST Cryptographic Standards and Guidelines Development Process: Report and Recommendations of the Visiting Committee on Advanced Technology of the National Institute of Standards and Technology” [107], 2014 Cryptographic competitions are not a panacea. DES, the output of the first cryptographic competition, had an exploitable key size (see [47], [60], [113], [30], and [52]), had an exploitable block size (see [78] and [29]), and at the same time had enough denials of exploitability (see, e.g., [61], [46, Section 7], [63], and [1]) to delay the deployment of stronger ciphers for decades. As another example, AES performance on many platforms relies on table lookups with secret indices (“S-table” or “T-table” lookups), and these table lookups were claimed to be “not vulnerable to timing attacks” (see [45, Section 3.3] and [83, Section 3.6.2]), but this claim was incorrect (see [16] and [104]), and this failure continues to cause security problems today (see, e.g., [39]).
    [Show full text]
  • Quantum Attacks Without Superposition Queries: the Offline
    Quantum Attacks without Superposition Queries: The Offline Simon’s Algorithm Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher To cite this version: Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher. Quantum Attacks without Superposition Queries: The Offline Simon’s Algorithm. QIP 2020 -23rd Annual Conference on Quantum Information Processing, Jan 2020, Shenzhen, China. hal-03142816 HAL Id: hal-03142816 https://hal.inria.fr/hal-03142816 Submitted on 16 Feb 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Quantum Attacks without Superposition Queries: The Offline Simon's Algorithm? Extended Abstract Xavier Bonnetain1;3, Akinori Hosoyamada2;4, Mar´ıaNaya-Plasencia1, Yu Sasaki2, and Andr´eSchrottenloher1 1 Inria, France fxavier.bonnetain,maria.naya plasencia,[email protected] 2 NTT Secure Platform Laboratories, Tokyo, Japan fhosoyamada.akinori,[email protected] 3 Sorbonne Universit´e,Coll`egeDoctoral, F-75005 Paris, France 4 Nagoya University, Nagoya, Japan Context Quantum cryptanalysis began with the seminal work of Shor [40], who showed that the RSA and Diffie-Hellman cryptosystems could be broken with a quantum computer. Simon's algorithm [41], which finds a hidden period in (f0; 1gn; ⊕), works in a very similar way, but it has been applied in cryptanalysis only recently.
    [Show full text]
  • Investigations Into Decrypting Live Secure Traffic in Virtual Environments
    Investigations into Decrypting Live Secure Traffic in Virtual Environments Peter William Lindsay McLaren A thesis submitted in partial fulfilment of the requirements of Edinburgh Napier University, for the award of Doctor of Philosophy July, 2019 i COPYRIGHT Copyright in the text of this thesis rests with the Author. Copies (by any process) either in full or of extracts may be made only by instructions given by the Author and lodged in the Edinburgh Napier University Library. Details may be obtained from the Librarian. This page must form part of any such copies made. Further copies (by any process) of copies made by such instruc- tions may not be made without the permission (in writing) of the Author. The ownership of any intellectual property rights which may be described in this thesis is vested in the Author, subject to any prior agreement to the contrary, and may not be made available for use by third parties without the written permission of the Author, which will prescribe the terms and conditions of any such agreement. Further information on the conditions under which disclosures and exploitation may take place is available from the Dean of the School of Computing. ii DECLARATION No portion of the work referred to in this thesis has been sub- mitted in support of an application for another degree or qualifi- cation of this or any other university or other institute of learning. iii ACKNOWLDEGMENTS The PhD research has been a thoroughly stimulating experience with many peaks and troughs along the way. I would not have completed the work without support from my family, friends, and my supervisory team at Edinburgh Napier University.
    [Show full text]
  • Nursery Crop Insurance Program
    2000 AND SUCCEEDING CROP YEARS FEDERAL CROP INSURANCE CORPORATION ELIGIBLE PLANT LIST AND PLANT PRICE SCHEDULE NURSERY CROP INSURANCE PROGRAM • CONNECTICUT • DELAWARE • MAINE • MARYLAND • MASSACHUSETTS • NEW HAMPSHIRE • NEW JERSEY • NEW YORK • NORTH CAROLINA • PENNSYLVANIA • RHODE ISLAND • VERMONT • VIRGINIA • WEST VIRGINIA GUIDE TO COMMERCIAL NOMENCLATURE The price for each plant and size listed in the Eligible Plant List and Plant Price Schedule is your lowest wholesale price, as determined from your wholesale catalogs or price lists submitted in accordance with the Special Provisions, not to exceed the maximum price limits included in this Schedule. CONTENTS INTRODUCTION Crop Insurance Nomenclature Format Crop Type and Optional Units Storage Keys Hardiness Zone Designations Container Insurable Hardiness Zones Field Grown Minimum Hardiness Zones Plant Size SOFTWARE AVAILABILITY System Requirements Sample Report INSURANCE PRICE CALCULATION Crop Type Base Price Tables ELIGIBLE PLANT LIST AND PLANT PRICE SCHEDULE APPENDIX A County Hardiness Zones B Storage Keys C Insurance Price Calculation Worksheet D Container Volume Calculation Worksheet The DataScape Guide to Commercial Nomenclature is used in this document by the Federal Crop Insurance Corporation (FCIC), an agency of the United States Department of Agriculture (USDA), with permission. Permission is given to use or reproduce this Eligible Plant List and Plant Price Schedule for purposes of administering the Federal Crop Insurance Corporation's Nursery Insurance program only. The DataScape
    [Show full text]
  • Cryptography in Industrial Embedded Systems Our Experience of Needs and Constraints
    Cryptography in Industrial Embedded Systems Our experience of needs and constraints JP Aumasson, Antony Vennard Who are we? • JP Aumasson: • BLAKE2, NORX, password hashing • competition, Gravity-SPHINCS, SipHash, … • Blackhat, Defcon, Troopers, ... • He’s not in control of these slides! • Antony Vennard • Software engineer (banking, defence, other) E4: Encryption + key management for embedded industrial systems (Announcements @ RWC) HALucinator, with EPFL: Firmware host emulation Consulting Trainings Code audits, security assessments Smartcard/HSM implementation Why are we here? • RFID Tags, Industrial Controllers, Sensors, Smart cards • Minimum 112-bit security level • ~ 2000 gate implementation (Simon/Speck paper) • Political reasons • Unclear/no power constraints • Unclear/no timing constraints • Unclear motivation to replace AES Industry Experience (ymmv) Wearable • Hardware crypto accelerator used • Using a widely used SSL library devices • P-256 and other “heavy” crypto customer • Cortex M-0 Satellite coms customer • AES + HMAC, crypto SDK • Device powerful enough for this • Geosynchronous orbit: limit transmission time window Sensor Networks Customer • Very limited payloads: can be as short as 12 bytes • AES-based network authentication credentials • Power + bandwidth largest concerns Smart Locks • NFC-based RFID authorization • AES-capable using smartcard crypto coprocessor • Also ECC-capable Bluetooth Low Energy • Multiprotocol 2.4GHz radio • 32-bit ARM Cortex M0 processor • 256kB/128kB flash and 32kB/16kB RAM • 128-bit AES ECB/CCM/AAR co-processor Where Chip details Cost What? x86 Instruction Set, POWER > 3 GHz $500 up Dedicated round instructions, instruction set keysched... ARMv8-A Variable 1 iPhone / 1 High-end Android / 1 Dedicated round instructions, keysched, Raspberry Pi plus support for GCM and GF() operations. AML11 ARM® Cortex®-M23 32 MHz ARM Cortex M23 CHF 58.96 Dedicated crypto accelerator AES-128, ("the new M4").
    [Show full text]