A SCON : A Submission to CAESAR Ch. Dobraunig, M. Eichlseder, F. - - PowerPoint PPT Presentation

a scon a submission to caesar
SMART_READER_LITE
LIVE PREVIEW

A SCON : A Submission to CAESAR Ch. Dobraunig, M. Eichlseder, F. - - PowerPoint PPT Presentation

S C I E N C E P A S S I O N T E C H N O L O G Y A SCON : A Submission to CAESAR Ch. Dobraunig, M. Eichlseder, F. Mendel, M. Schl affer Graz University of Technology CECC 2015 www.iaik.tugraz.at www.iaik.tugraz.at The


slide-1
SLIDE 1

S C I E N C E P A S S I O N T E C H N O L O G Y www.iaik.tugraz.at

ASCON: A Submission to CAESAR

  • Ch. Dobraunig, M. Eichlseder, F. Mendel, M. Schl¨

affer Graz University of Technology CECC 2015

slide-2
SLIDE 2

www.iaik.tugraz.at

The Team

Christoph Dobraunig Maria Eichlseder Florian Mendel Martin Schl¨ affer

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 2

slide-3
SLIDE 3

www.iaik.tugraz.at

Overview

CAESAR Design of ASCON Security analysis Implementations

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 3

slide-4
SLIDE 4

www.iaik.tugraz.at

CAESAR

CAESAR: Competition for Authenticated Encryption – Security, Applicability, and Robustness http://competitions.cr.yp.to/caesar.html Inspired by AES SHA-3 eStream

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 4

slide-5
SLIDE 5

www.iaik.tugraz.at

CAESAR – Candidates

ACORN ++AE AEGIS AES-CMCC AES-COBRA AES-COPA AES-CPFB AES-JAMBU AES-OTR AEZ Artemia Ascon AVALANCHE Calico CBA CBEAM CLOC Deoxys ELmD Enchilada FASER HKC HS1-SIV ICEPOLE iFeed[AES] Joltik Julius Ketje Keyak KIASU LAC Marble McMambo Minalpher MORUS NORX OCB OMD PAEQ PAES PANDA π-Cipher POET POLAWIS PRIMATEs Prøst Raviyoyla Sablier SCREAM SHELL SILC Silver STRIBOB Tiaoxin TriviA-ck Wheesht YAES

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 5

slide-6
SLIDE 6

www.iaik.tugraz.at

CAESAR – Candidates

ACORN ++AE AEGIS AES-CMCC AES-COBRA AES-COPA AES-CPFB AES-JAMBU AES-OTR AEZ Artemia Ascon AVALANCHE Calico CBA CBEAM CLOC Deoxys ELmD Enchilada FASER HKC HS1-SIV ICEPOLE iFeed[AES] Joltik Julius Ketje Keyak KIASU LAC Marble McMambo Minalpher MORUS NORX OCB OMD PAEQ PAES PANDA π-Cipher POET POLAWIS PRIMATEs Prøst Raviyoyla Sablier SCREAM SHELL SILC Silver STRIBOB Tiaoxin TriviA-ck Wheesht YAES

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 6

slide-7
SLIDE 7

www.iaik.tugraz.at

ASCON – Design Goals

Security Efficiency Lightweight Simplicity Online Single pass Scalability Side-Channel Robustness

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 7

slide-8
SLIDE 8

www.iaik.tugraz.at

ASCON – General Overview

Nonce-based AE scheme Sponge inspired

p12

64 64

0∗K K0∗

128

T p12

256

IV KN Initialization Plaintext Finalization Processing K 1 P1 C1 p6 p6 Pt Ct P2 C2

256 64 256 256

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 8

slide-9
SLIDE 9

www.iaik.tugraz.at

ASCON – Permutation

Iterative application of round function One round Constant addition Substitution layer Linear layer

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 9

slide-10
SLIDE 10

www.iaik.tugraz.at

ASCON – Round

Substitution layer

x4 x3 x2 x1 x0

Linear layer

x4 x3 x2 x1 x0

x1

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 10

slide-11
SLIDE 11

www.iaik.tugraz.at

ASCON – Round

x0 x1 x2 x3 x4 x0 x1 x2 x3 x4 x0 ⊕ (x0 ≫ 19) ⊕ (x0 ≫ 28) → x0 x1 ⊕ (x1 ≫ 61) ⊕ (x1 ≫ 39) → x1 x2 ⊕ (x2 ≫ 1) ⊕ (x2 ≫ 6) → x2 x3 ⊕ (x3 ≫ 10) ⊕ (x3 ≫ 17) → x3 x4 ⊕ (x4 ≫ 7) ⊕ (x4 ≫ 41) → x4 S-box Linear transformation

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 11

slide-12
SLIDE 12

www.iaik.tugraz.at

Analysis – ASCON [DEMS15]

Attacks on round-reduced versions of ASCON-128 Key-recovery Forgery Analysis of the building blocks Permutation

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 12

slide-13
SLIDE 13

www.iaik.tugraz.at

Key-recovery – Idea

Target initialization Choose nonce Observe key-stream Deduce information about the secret key

rounds time method ASCON-128 6 / 12 266 cube-like 5 / 12 235 5 / 12 236 differential-linear 4 / 12 218

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 13

slide-14
SLIDE 14

www.iaik.tugraz.at

Key-recovery – Idea

Target initialization Choose nonce Observe key-stream Deduce information about the secret key

rounds time method ASCON-128 6 / 12 266 cube-like 5 / 12 235 5 / 12 236 differential-linear 4 / 12 218

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 13

slide-15
SLIDE 15

www.iaik.tugraz.at

Forgery – Idea

P1 C1 p6 p6 Pt Ct = ∆ P2 C2 K0∗ T = ∆ p12 K

128 64 64 256 256 256

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 14

slide-16
SLIDE 16

www.iaik.tugraz.at

Forgery – ASCON-128

3/12 rounds finalization probability 2−33

input difference after 1 round after 2 rounds after 3 rounds x0 8000000000000000 8000100800000000 8000000002000080 ???????????????? x1 0000000000000000 8000000001000004 9002904800000000 ???????????????? x2 0000000000000000 → 0000000000000000 → d200000001840006 → ???????????????? x3 0000000000000000 0000000000000000 0102000001004084 4291316c5aa02140 x4 0000000000000000 0000000000000000 0000000000000000 090280200302c084

4/12 rounds finalization probability 2−101

input difference after 4 rounds x0 8000000000000000 ???????????????? x1 0000000000000000 ???????????????? x2 0000000000000000 → ???????????????? x3 0000000000000000 280380ec6a0e9024 x4 0000000000000000 eb2541b2a0e438b0

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 15

slide-17
SLIDE 17

www.iaik.tugraz.at

Analysis – Permutation

Zero-sum distinguisher 12 rounds with complexity 2130 Search for differential and linear characteristics Proof on minimum number of active S-boxes

result rounds differential linear proof 1 1 1 2 4 4 3 15 13 heuristic 4 44 43 ≥ 5 > 64 > 64

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 16

slide-18
SLIDE 18

www.iaik.tugraz.at

Implementation – ASCON

Software 64-bit Intel platforms ARM NEON 8-bit ATmega128 Hardware [GWDE15] High-speed Low-area Threshold implementations

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 17

slide-19
SLIDE 19

www.iaik.tugraz.at

Software – 64-bit Intel

One message per core (Core2Duo)

64 512 1024 4096 ASCON-128 (c/B) 22.0 15.9 15.6 15.2 ASCON-96 (c/B) 17.7 11.0 10.5 10.3

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 18

slide-20
SLIDE 20

www.iaik.tugraz.at

Software – 64-bit Intel

One message per core (Core2Duo)

64 512 1024 4096 ASCON-128 (c/B) 22.0 15.9 15.6 15.2 ASCON-96 (c/B) 17.7 11.0 10.5 10.3

Four messages per core [Sen15] (Haswell)

64 512 1024 4096 ASCON-128 (c/B) 10.49 7.33 7.11 6.94 ASCON-96 (c/B) 8.55 5.26 5.02 4.85

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 18

slide-21
SLIDE 21

www.iaik.tugraz.at

Hardware – Results [GWDE15]

Chip Area Throughput Power Energy [kGE] [Mbps] [µW] [µJ/byte] Unprotected Implementations Fast 1 round 7.08 5 524 43 33 Fast 6 rounds 24.93 13 218 184 23 Low-area 2.57 14 15 5 706

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 19

slide-22
SLIDE 22

www.iaik.tugraz.at

Hardware – Results [GWDE15]

Chip Area Throughput Power Energy [kGE] [Mbps] [µW] [µJ/byte] Unprotected Implementations Fast 1 round 7.08 5 524 43 33 Fast 6 rounds 24.93 13 218 184 23 Low-area 2.57 14 15 5 706

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 19

slide-23
SLIDE 23

www.iaik.tugraz.at

Hardware – Results [GWDE15]

Chip Area Throughput Power Energy [kGE] [Mbps] [µW] [µJ/byte] Unprotected Implementations Fast 1 round 7.08 5 524 43 33 Fast 6 rounds 24.93 13 218 184 23 Low-area 2.57 14 15 5 706 Threshold Implementations Fast 1 round 28.61 3 774 183 137 Fast 6 rounds 123.52 9 018 830 104 Low-area 7.97 15 45 17 234

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 19

slide-24
SLIDE 24

www.iaik.tugraz.at

ASCON-128 – Choice of Parameters

Now: (c,r) = (256, 64) Conservative choice Proposed: (c,r) = (192, 128) [BDPA11] Significant speedup (factor 2) Limit on data complexity 264 Proposed: (c,r) = (128, 192) [JLM14] Significant speedup (factor 3) More analysis needed

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 20

slide-25
SLIDE 25

www.iaik.tugraz.at

More Information

http://ascon.iaik.tugraz.at

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 21

slide-26
SLIDE 26

www.iaik.tugraz.at

Acknowledgments

The work has been supported in part by the Austrian Science Fund (project P26494-N15) and by the Austrian Research Promotion Agency (FFG) and the Styrian Business Promotion Agency (SFG) under grant number 836628 (SeCoS).

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 22

slide-27
SLIDE 27

www.iaik.tugraz.at

Reference I

[BDPA11] Guido Bertoni, Joan Daemen, Micha¨ el Peeters, and Gilles Van Assche. Duplexing the sponge: Single-pass authenticated encryption and other applications. In Ali Miri and Serge Vaudenay, editors, Selected Areas in Cryptography – SAC 2011, volume 7118 of LNCS, pages 320–337. Springer, 2011. [CAE14] CAESAR committee. CAESAR: Competition for authenticated encryption: Security, applicability, and robustness. http://competitions.cr.yp.to/caesar.html, 2014. [DEMS14] Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schl¨ affer. Ascon. Submission to the CAESAR competition: http://ascon.iaik.tugraz.at, 2014. [DEMS15] Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schl¨ affer. Cryptanalysis of ascon. In Kaisa Nyberg, editor, Topics in Cryptology - CT-RSA 2015, volume 9048 of LNCS, pages 371–387. Springer, 2015.

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 22

slide-28
SLIDE 28

www.iaik.tugraz.at

Reference II

[DMP+15] Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, and Michal Straus. Cube attacks and cube-attack-like cryptanalysis on the round-reduced keccak sponge function. In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology – EUROCRYPT 2015, Part I, volume 9056 of LNCS, pages 733–761. Springer, 2015. [GWDE15] Hannes Groß, Erich Wenger, Christoph Dobraunig, and Christoph Ehrenh¨

  • fer.

Suit up! made-to-measure hardware implementations of ascon. IACR Cryptology ePrint Archive, 2015:34, 2015. to appear on 18th Euromicro Conference on Digital Systems Design. [JLM14] Philipp Jovanovic, Atul Luykx, and Bart Mennink. Beyond 2c/2 security in sponge-based authenticated encryption modes. In Palash Sarkar and Tetsu Iwata, editors, Advances in Cryptology – ASIACRYPT 2014, Part I, volume 8873 of LNCS, pages 85–104. Springer, 2014. [Sen15] Thomas Senfter. Multi-message support for ascon. Bachelors’s Thesis, 2015.

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 23

slide-29
SLIDE 29

www.iaik.tugraz.at

Hardware – High-speed [GWDE15]

State Registers

63

S-Box

>> 1 >> 6 >> 61 >> 39 >> 10 >> 17 >> 19 >> 28 >> 7 >> 41

Linear Diffusion Layer

io_data

63

p0 p1 p2 p3 p4 x0 x1 x2 x3 x4 t0 t1 t2 t3 t4 key_reg [127:64] key_reg [63:0] key_reg [63:0] key_reg [127:64] round_const “000...1”_

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 24

slide-30
SLIDE 30

www.iaik.tugraz.at

Hardware – Low-area [GWDE15]

x0 x1 x2 x3 x4 s0 s1 s2 s3 s4

S-Box

63

tmp

State Shift Registers

  • Temp. Shift Register

x0...4 tmp s0...4 io_data x ⊕ state_sel tmp_sel key_reg [⊕ x1,2 ] io_data [⊕ x0 ] round_const ⊕ x2

Linear Diffusion Layer

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 25

slide-31
SLIDE 31

www.iaik.tugraz.at

Hardware – Comparison [GWDE15]

102 103 104 5 10 15 20 25 Ascon-fast-1R Ascon-fast-2R Ascon-fast-3R Ascon-fast-6R AES-ALE AES-OCB2 AES-CCM AES-OCB Keccak-MD Minalpher-speed Minalpher-area Scream-1R Scream-2R SILCv1 SILCv2 Throughput [Mbits/sec] Chip Area [kGE] Faster More Efficient Smaller

  • Ch. Dobraunig, M. Eichlseder, F

. Mendel, M. Schl¨ affer CECC 2015 26