Ruhr Ruhr Universi Universi ty ty Bochum Bochum Cryptography in Cryptography in Heavily Constraint Heavily Constraint Environments Environments Christof Paar Christof Paar EUROBITS Center for IT Security EUROBITS Center for IT Security CO CO mmunication mmunication S S ecurit ecurit Y Y (COSY) (COSY) Group Group University of Bochum, Germany University of Bochum, Germany www.crypto.rub.de www.crypto.rub.de
Cryptography in Heavily Constraint Environments. Christof Paar EUROBITS Center for IT Security CO mmunication S ecurit Y (COSY) Group University of Bochum, Germany www.crypto.rub.de. Contents. Pervasive computing and embedded systems Pervasive computing and security - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
RuhrRuhrUniversityUniversityBochumBochum
Cryptography in Heavily Cryptography in Heavily
Constraint EnvironmentsConstraint Environments
Christof PaarChristof Paar
EUROBITS Center for IT SecurityEUROBITS Center for IT Security
COCOmmunication mmunication SSecuritecuritY Y (COSY) Group(COSY) Group
University of Bochum, GermanyUniversity of Bochum, Germany
www.crypto.rub.dewww.crypto.rub.de
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
ContentsContents
• Pervasive computing and embedded systems
• Pervasive computing and security• Constrained environments and crypto• Research problems
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Characteristics of Traditional Characteristics of Traditional IT ApplicationsIT Applications
• Mostly based on interactive (= traditional) computers
• „One user – one computer“ paradigm• Static networks• Large number of users per network
Q: How will the IT future look?
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Examples for Pervasive Examples for Pervasive ComputingComputing
• PDAs, 3G cell phones, ...• Living spaces will be stuffed with nodes• So will cars• Wearable computers (clothes, eye glasses, etc.)• Household appliances• Smart sensors in infrastructure (windows, roads,
bridges, etc.)• Smart bar codes (autoID)• “Smart Dust”• ...
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Will that ever become Will that ever become reality??reality??
We don’t know, but: CPUs sold in 2000
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Security and Economics of Security and Economics of Pervasive NetworksPervasive Networks
• „One-user many-nodes“ paradigm (e.g. 102-103 processors per human)
• Many new applications we don‘t know yet• Very high volume applications• Very cost sensitive• People won‘t be willing to pay for security
per se • People won‘t buy products without security
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Where are the challenges for Where are the challenges for embedded security?embedded security?
• Designers worry about IT functionality, security is ignored or an afterthought
• Attacker has easy access to nodes • Security infrastructure (PKI etc.) is missing:
Protocols???• Side-channel and tamper attacks• Computation/memory/power constrained
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Why do constraints matter?Why do constraints matter?
• Almost all ad-hoc protocols (even routing!) require crypto ops for every hop
• At least symmtric alg. are needed• Asymmetric alg. allow fancier protocols
Question: What type of crypto can we do?
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Classification by Processor PowerClassification by Processor Power
Very rough classification of embedded processors
Class speed : high-end Intel
Class 0: few 1000 gates ?
Class 1: 8 bit P, 10MHz 1: 103
Class 2: 16 bit P, 50MHz 1: 102
Class 3: 32 bit P, 200MHz 1: 10
RuhrRuhrUniversityUniversityBochumBochum
Communication Security Communication Security (COSY) Group(COSY) Group
Workshop on Ad-Hoc Security 2002
Case Study Class 0: RFIDCase Study Class 0: RFID
Recall: Class 0 = no P, few 1000 gates
• Goal: RFID as bar code replacement• Cost goal 5 cent (!)• allegedly 500 x 109 bar code scans worldwide per day