13
1 November 29, 2016 The Challenges of Securing and Authenticating Embedded Devices and a Suggested Approach for RISC-V RISC-V Workshop Derek Atkins Chief Technology Officer 617-623-3745 [email protected]

The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins ([email protected]) Title: The Challenges of Securing and Authenticating

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

1

November 29, 2016

The Challenges of Securing andAuthenticating Embedded Devices and aSuggested Approach for RISC-VRISC-V Workshop

Derek AtkinsChief Technology [email protected]

Page 2: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

2

What do you think when...

Think about your small embedded device.

Imagine trying to secure it with public key technology.

Can it be done?

Page 3: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

3

What About Symmetric Solutions?

Why not just use Symmetric Encryption (e.g. AES)?

I It fits

I It’s fast

but.....

I It’s hard to deploy

I It doesn’t scale

Page 4: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

4

Public Key’s Bad Rap

Why do people think Public Key won’t work?

I Too big

I Too slow

I Too much power/energy

Page 5: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

5

The Bad News

Many of these beliefs are true.

I Speed: ARM reports ECC execution times in the 233-1089 ms rangeon the Cortex-M (0-4)

I Size: Implementations of ECC range in 8-30KB of ROM and require800-3000B of RAM

I Hardware implementations are faster but take a lot of gates (orLUTs)

I RSA and Diffie-Hellman are larger and take longer

Why? Multiplying 256-4096-bit numbers takes a lot of effort!

Page 6: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

6

Some Good NewsEnter Group Theoretic Cryptography (GTC)

I Studied over 100 years

I GTC dates to the 1970s

I Complexity scales linearly with security(instead of quadratically like RSA,ECC, and DH)

Page 7: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

7

More on GTC

GTC is small, fast, secure, and quantum resistant.

GTC doesn’t require extended math like ECC/RSA/DH(GTC uses 6-8 bit math)

GTC implementations are small, efficient, and fast

SecureRF supplies a GTC-based key agreement and digital signaturemethod for RISC-V (and other platforms)

Page 8: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

8

GTC Methods

I Ironwood Key Agreement Protocol

Enables two endpoints to generate a shared secret over an openchannel.

I Walnut Digital Signature Algorithm

Allows one device to generate a document that is verified by another.

Very fast verification

Page 9: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

9

Test Platform

RISC-V Core SiFive E3 Coreplex with single-issue in-order, 32-bitexecution pipeline, RV32IM.

Toolchain SiFive RISC-V GNU toolchain. Hardware multiply anddivide instructions disabled.

Debugger Olimex ARM-USB-TINY-H with JTAG support.

Dev board Digilent Arty with Xilinx Artix-7 FPGA, no hardprocessor system, core clock speed: 62.5MHz.

Page 10: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

10

WalnutDSA vs. ECDSA

WalnutDSA microECC

Implementation C C

Run time 4.9 ms * 2,110 ms

Cycle count 307,300 131,874,900

ROM used 4,780 31,920

RAM used 272 940

* 458 ms with hardware multiple/divide instructions enabled

Page 11: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

11

C vs. RISC-V Assembly Language

C RISC-V Assembly

Method WalnutDSA, 128bit WalnutDSA, 128bit

Run time 4.9 ms 3.0 ms

Cycle count 307,300 188,700

ROM used 4,780 4,580

RAM used 272 272

Page 12: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

12

RISC-V vs. ARM Cortex-M3

RISC-V ARM Cortex-M3

Method WalnutDSA, 128bit WalnutDSA, 128bit

Implementation C C

Core clock freq 62.5 MHz 48 MHz

Run time 4.9 ms 5.7 ms

Cycle count 307,300 275,563

ROM used 4,780 2,952

RAM used 272 272

Page 13: The Challenges of Securing and Authenticating Embedded ... · Shelton, CT 06484 (203) 227-3151 Derek Atkins (datkins@securerf.com) Title: The Challenges of Securing and Authenticating

13

Thank You!Any Questions?

SecureRF Corporation100 Beard Sawmill Rd, Suite 350

Shelton, CT 06484(203) 227-3151

Derek Atkins ([email protected])