Stream Ciphers for Constrained Environments

Stream Ciphers for Constrained Environments

Stream Ciphers for Constrained Environments Meltem S¨onmez Turan National Institute of Standards and Technology November 7, 2011 Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 1 / 19 Stream Ciphers Symmetric key cryptosystems Stream ciphers simulate the idea of unconditionally secure One Time Pad. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 2 / 19 Stream Ciphers Partition the plaintext into bits or words (e.g. 16, 32 bits) and encrypt each block using a time-varying encryption function. Two types of stream ciphers Synchronous stream ciphers Self-synchronizing stream ciphers Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 3 / 19 Stream Ciphers Partition the plaintext into bits or words (e.g. 16, 32 bits) and encrypt each block using a time-varying encryption function. Two types of stream ciphers Synchronous stream ciphers Self-synchronizing stream ciphers Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 4 / 19 Generic Structure of Synchronous Stream Ciphers Key/IV Initialization For correct decryption, sender and receiver must be synchronized, i.e. they must have the same internal state at time t. If ciphertext bits are deleted/inserted, then synchronization is lost and rest of the ciphertext is useless. A Key/IV initialization function is used for resynchronization. PRNG Keystream is independent of the plaintext. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 5 / 19 Properties of Synchronous Stream Ciphers No Error Propagation A change in the ciphertext bit affects only the corresponding bit in the deciphered plaintext. Encryption p1; p2; : : : ; pn ⊕ z1; z2; : : : ; zn Decryption 0 c1; c2; : : : ; cn ! Insecure Channel ! c1; c2; : : : ; cn ⊕ z1; z2; : : : ; zn 0 p1, p2; : : : ; pn Suitable for encrypting voice and video Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 6 / 19 Well-known Examples E0 used in Bluetooth RC4 used in Secure Socket Layer (SSL) protocol A5/1 used in the Global System for Mobile (GSM) Communication Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 7 / 19 Constrained Environments Requirements Small chip sizes Less(peak and average) energy consumption (limited lifetime of the devices) Short processing times High throughput is not always necessary. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 8 / 19 Stream Ciphers for Constrained Environments Design approaches Ad hoc designs Bit oriented Common building block: Feedback shift registers Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 9 / 19 Key Size Key and State Size Key size determines the security level Large key size ≡ High cost Time Memory Tradeoff Attacks: speed up exhaustive search by using memory. To resists TMTO attacks, the size of the internal state should at least be twice the key size. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 10 / 19 Ecrypt eSTREAM Project 4-year (between October 2004 - May 2008) network of excellence funded project by European Network of Excellence for Cryptology (ECRYPT) Goals: to identify new stream ciphers that might be suitable for widespread adoption to stimulate work in stream ciphers. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 11 / 19 eStream Profile II Call for primitives within two profiles Profile I: for software applications with high throughput requirements. Profile II: for hardware applications with restricted resources such as limited storage, gate count, or power consumption. Profile II Key size is 80 bits. eStream received 25 candidates for Profile II. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 12 / 19 eStream Profile II Finalists Finalists are; Grain by Hell, Johansson and Meier F-FCSR-H by Berger, Arnault and Lauradoux (Broken, and removed from the portfolio) Trivium by Canniere and Preneel Mickey by Babbage and Dodd Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 13 / 19 Grain Based on bit oriented FSRs. Main components: 80-bit LFSR, 80-bit NFSR, Boolean function Internal state size of 160 bits. Well studied General Structure Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 14 / 19 Trivium Based on bit oriented FSRs. Main components: Three nonlinear shift registers Internal state size of 288 bits. Well studied General Structure Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 15 / 19 Mickey Based on bit oriented registers. Main components: Two registers of size 100 Internal state size of 200 bits. Not well studied. General Structure Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 16 / 19 Not efficient enough for constrained devices! Advanced Encryption Standard AES - Counter Mode Secure, Well understood, Standardized Fast and efficient Meets most needs. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 17 / 19 Advanced Encryption Standard AES - Counter Mode Secure, Well understood, Standardized Fast and efficient Meets most needs. Not efficient enough for constrained devices! Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 17 / 19 Call for Feedback There is no NIST approved stream cipher. Do we need dedicated stream ciphers? More cryptanalytic results on stream ciphers and their impact on practical applications Performance comparison of lightweight stream ciphers and AES Counter Mode Experimental results (on power consumption, storage, complexity etc.) for environments that AES cannot be used. Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 18 / 19 THANKS! [email protected] Meltem S¨onmez Turan (NIST) Stream Ciphers for Constrained Environments November 7, 2011 19 / 19 .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us