460 likes | 630 Views
Kris Gaj George Mason University. FPGA & Crypto: Is Marriage in the Cards?. fragments of the presentation at the CryptArchi workshop, France, June 2004. Possible Applications of Cryptographic Hardware. Why are cryptographic chips needed?. hardware accelerators for web servers
E N D
Kris Gaj George Mason University FPGA & Crypto: Is Marriage in the Cards? fragments of the presentation at the CryptArchi workshop, France, June 2004
Possible Applications of Cryptographic Hardware
Why are cryptographic chips needed? • hardware accelerators for web servers • SSL (Secure Socket Layer) – cryptographic protocol • used by majority of today’s web servers • to protect credit card numbers for on-line transactions • such as buying a book on the amazon.com Estimated number of web servers as of Oct. 2000 6 million Source: NEC Research See http://www.pittsburghsolutions.com/eresearch-news.htm However, only servers exposed to a large number of transactions require hardware acceleration
Why are cryptographic chips needed? • hardware accelerators for • Virtual Private Networks (VPNs) • IPSec (Secure Internet Protocol) – cryptographic protocol • used to support VPNs (Virtual Private Networks), i.e., secure • communication between remote Local Area Networks (LANs) • using Internet • IPSec optional in IP ver. 4, required in emerging IP ver. 6 • Acceleration can be provided using: • - secure VPN gateways and routers • - secure client PCMCIA cards.
Virtual Private Network Remote user Security gateway Security gateway Host Host . . . . . . . . Internet Cryptographic end points Host Host • local networks may belong to the same or different organizations • security gateways may come from different vendors
Types of VPN devices • high-end VPN devices • e.g. corporate security gateways and routers • speeds reaching 1 Gbit/s and beyond • delay & bandwidth sensitive applications • VoIP (Voice over IP), video conferencing • low-end VPN devices • e.g. home routers • low cost • moderate speed (up to 10-100 Mbit/s)
Why are cryptographic chips needed? • hardware accelerators for wireless gateways • IEEE 802.11 – most popularwireless protocol • including strong encryption and authentication Wireless gateway
Why are cryptographic chips needed? • Storage Area Networks Encryption of data during transmission and at rest. • Pay TV • High volume • Pay TV decoders must be tamper-resistant • Capability of a remote upgrade can substantially • reduce the cost of recovering from an attack
Why are cryptographic chips needed? Low volume applications, cost not a major factor • space applications • cipher breaking machines • general-purpose reconfigurable supercomputers High volume applications, cost a major factor • secure cell phones, PDAs, pagers • smartcards
Families of Cavium chips: Nitrox Lite, Nitrox, Nitrox II
Among them the following encryption chipmakers … Broadcom HiFn Cavium SafeNet Intel AEP Systems Corrent Motorola Layer N Networks NetContinuum NetOctave Philips Semiconductors . . . . . .
Cryptographic ASICs - Summary • distributed market with multiple small players • volumes sold by individual vendors may not justify • ASIC solutions • multiple companies already developing cryptographic • IP cores for FPGAs (ALMA Technologies, Amphion, • Bisquare Systems Private Ltd., Helion Technologies, • Ocean Logic Pty Ltd., etc.)
Cryptographic Transformations Most Often Implemented Secret-key Cryptosystems Hash Functions • SHA-1 • SHA-2 (256, 384, 512) • MD5 • Triple DES • AES-Rijndael • other AES finalists • (Mars, RC6, Serpent, Twofish) Public-Key Cryptosystems • RSA • DH, DSA • ECC (Elliptic Curve Cryptosystems)
Secret-Key Encryption Cores Major Architectures Throughput Pipelined / Ultra fast 10 Gbit/s 1 Gbit/s Fast 500Mbit/s Standard 100Mbit/s Area Compact / Tiny
Standard iterative architecture input multiplexer key register one round combinational logic Key scheduling round key output
Implementations of AES candidates using Xilinx, Virtex 1000 Speed [Mbit/s] 500 George Mason University 444 431 414 450 University of Southern California 400 Worcester Polytechnic Institute 353 350 294 300 250 177 200 173 149 143 150 112 102 104 88 100 62 61 50 0 RC6 Mars Rijndael Twofish Serpent I1 Serpent I8
Implementations of AES candidates using Xilinx, Virtex 1000 Area=Cost [CLB slices] 9000 7964 George Mason University 8000 University of Southern California 7000 Worcester Polytechnic Institute 5511 6000 4621 4507 5000 4312 3528 4000 2809 2507 2744 2638 2666 3000 1749 2000 1250 1076 1137 1000 0 Serpent I8 Serpent I1 Twofish Mars Rijndael RC6
Fully pipelined / Ultra fast architecture k registers round 1 = k pipeline stages . . . . round 2 =k pipeline stages . . . . . . . . round #rounds =k pipeline stages . . . .
Full mixed pipelining in Virtex FPGAs Gaj & Chodowiec, RSA Conf. 2001 Throughput [Gbit/s] 16.8 18 15.2 16 13.1 12.2 14 12 10 8 6 4 2 0 Serpent RC6 Twofish Rijndael
Full mixed pipelining in Virtex FPGAs Gaj & Chodowiec, RSA Conf. 2001 Area [CLB slices] 46,900 50000 dedicated memory blocks, RAMs 45000 40000 35000 30000 21,000 25000 19,700 20000 12,600 15000 80 RAMs 10000 5000 0 Serpent Twofish RC6 Rijndael
Area 432 6 available required for AES 222 3 CLB Slices BlockRAMs Compact / Tiny AES Core Chodowiec & Gaj, CHES 2003 • The entire design fits in a single Spartan-II XC2S30, second smallest in the Spartan-II family • Nearly 50% of the device available for other logic • Throughput: 174Mbps at 60MHz clock frequency
Amphion IP cores (1) ASIC/ FPGA 1.66 1.70 1.76 2.35 2.00 1.36 2.19 2.74 2.00 2.50
Amphion IP cores (2) ASIC/ FPGA 2.08 2.22 2.48 2.20 2.02 3.75 3.35 3.35
Helion Technologies cores ASIC/ FPGA 1.20 2.24 1.18 2.50 1.95 2.00 1.14 1.53 2.30
Public-Key Cryptosystems • RSA • DH, DSA • ECC (Elliptic Curve Cryptosystems)
RSA – the best reported academic results obtained using FPGAs Authors: T. Blum & C. Paar, WPI ARITH 1999, IEEE Trans. on Computers, 2001 Platform: Xilinx XC40250XV-9 (8464 CLBs) and XC40150XV-8 (5184 CLBs) Best result: Number of the RSA 1024-bit signatures per second 322
RSA – results reported in the industry using ASICs Number of the RSA 1024-bit signatures per second: SafeNet, SafeXcel 1842: 2,100 Cavium, CN1340, NitroxPlus 42,000
Weimerskirch, Paar, Shantz Lopez & Dahab Okada, Tori, et al. Orlando & Paar Sun Microsystems
FPGA Crypto - Summary • FPGAs fully competitive with ASICs for implementation • of secret key ciphers and hash functions • FPGAs emerging as competitive with ASICs for • implementation of public key cryptosystems • Problems: • size of operands • support for fast arithmetic operations
ASICs, Software, or maybe FPGAs?
FPGAs vs. ASICs Pawel Chodowiec, GMU, PhD Thesis
Cryptographic applications “reserved” for ASICs • smart cards • wireless devices: cell phones, PDAs, pagers • Requirements that make FPGAs non-competitive • for these applications: • small size • very low cost • very low power consumption • resistance to side-channel attacks such as • power analysis or electromagnetic emission analysis
Why are FPGAs better for the remaining applications? FPGAs vs. ASICs Existing advantages: • lower development costs • shorter time to the market Potential advantages: • lower maintenance costs • Secure remote upgrades (patches) • Secure remote updates (new algorithms)
Why are FPGAs better for the remaining applications? FPGAs vs. software Existing advantages: • speed Potential advantages: • true random number generation • secure key storage • resistance to tampering
Why FPGAs are not used in real-life applications? Perceived difficulties: • too small capacity • too small speed • low security Real difficulties: • remote upgrade • temper resistance • key protection • random number generation