Introducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine

Similar documents
PIC32 MX1/MX2 Microcontrollers. Dave Richkas Product Marketing Manager High-Performance Microcontroller Division Microchip Technology Inc.

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P))

Introducing: New Low-Cost & Low Pin Count PIC Microcontrollers for the 8-, 16- & 32-bit Markets

Block Cipher Operation. CS 6313 Fall ASU

Block Cipher Modes of Operation

Block Cipher Modes of Operation

Content of this part

Connectivity. Ethernet

Symmetric Encryption. Thierry Sans

ECE 646 Lecture 8. Modes of operation of block ciphers

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

CSCI 454/554 Computer and Network Security. Topic 3.2 Secret Key Cryptography Modes of Operation

Double-DES, Triple-DES & Modes of Operation

Using block ciphers 1

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75

Chapter 8. Encipherment Using Modern Symmetric-Key Ciphers

Crypto Library. Microchip Libraries for Applications (MLA) Copyright (c) 2012 Microchip Technology Inc. All rights reserved.

New STM32WB Series MCU with Built-in BLE 5 and IEEE

Chapter 6 Contemporary Symmetric Ciphers

ECE 646 Lecture 7. Modes of Operation of Block Ciphers. Modes of Operation. Required Reading:

CIS 6930/4930 Computer and Network Security. Topic 3.1 Secret Key Cryptography (Cont d)

Processing with Block Ciphers

CSC/ECE 574 Computer and Network Security. Processing with Block Ciphers. Issues for Block Chaining Modes

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Modes of operation for an n-bit block cipher

Introduction to Cryptography. Lecture 2. Benny Pinkas. Perfect Cipher. Perfect Ciphers. Size of key space

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Secret Key Cryptography

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Lecture 2B. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram

MM23SC8128RM Flash Security Turbo Microcontroller Smart Card Chip With 1024 bit RSA & Maths Co-processor

Security Policy for FIPS KVL 3000 Plus

Stream Ciphers. Stream Ciphers 1

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

CIS 6930/4930 Computer and Network Security. Topic 3.2 Secret Key Cryptography Modes of Operation

Block Cipher Operation

ACR1255U-J1 Secure Bluetooth NFC Reader

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

XMEGA Series Of AVR Processor. Presented by: Manisha Biyani ( ) Shashank Bolia (

CIS 4360 Secure Computer Systems Symmetric Cryptography

Chapter 3 Block Ciphers and the Data Encryption Standard

Stream Ciphers and Block Ciphers

Some Aspects of Block Ciphers

Efficient HVAC System

New STM32WB Series MCU with built-in Bluetooth 5 and IEEE

Zatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions

ECE 545 Lecture 8b. Hardware Architectures of Secret-Key Block Ciphers and Hash Functions. George Mason University

6 Block Ciphers. 6.1 Block Ciphers CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

Introduction to Cryptography. Lecture 3

March 31, Announcing the PIC16(L)F170X/171X 8-bit MCU Family

Microchip Technology Enhances Popular 16- and 32-bit Development Platform with Application-Specific Expansion Hardware

3 Symmetric Cryptography

ZLF645 Crimzon Flash Microcontroller with ZBase Database Industry Leading Universal Infrared Remote Control (UIR) Solution

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Enabling IOT. IQRF Alliance Conference May Harald Weidinger Key Client Manager

Symmetric Encryption Algorithms

AES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications

Block Ciphers. Advanced Encryption Standard (AES)

Join the forward thinkers who rely on Toshiba for wireless connectivity ICs.

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

STM32 Cortex-M3 STM32F STM32L STM32W

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

Cypress PSoC 4 Microcontrollers

Modes of Operation. Raj Jain. Washington University in St. Louis

1 Achieving IND-CPA security

Connectivity Solutions for Embedded Design:

Data Encryption Standard (DES)

TI SimpleLink dual-band CC1350 wireless MCU

New 70 MIPS dspic33ep and PIC24EP Family High Performance, Integrated Analog, Easy Migration

Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways of doing this

L9: Stream and Block Ciphers. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

BlackBerry BlackBerry 10 OS, version continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices.

Introducing STM32 L0x Series. April

Introduction to Symmetric Cryptography

Connectivity Solutions for Embedded Design:

Cypress PSoC 4 Microcontrollers

Modern Symmetric Block cipher

Introduction to Cryptography. Lecture 3

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

Network Security Essentials Chapter 2

STM32F7 series ARM Cortex -M7 powered Releasing your creativity

SAM A5 ARM Cortex - A5 MPUs

CSC 474/574 Information Systems Security

IDEA, RC5. Modes of operation of block ciphers

Jaap van Ginkel Security of Systems and Networks

Crypto: Symmetric-Key Cryptography

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Stream Ciphers and Block Ciphers

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Corporate Profile. Applying minds to technology

Stream ciphers. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 91

Lecture 1 Applied Cryptography (Part 1)

Network Security Essentials

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

16-bit Embedded Control Solutions

Sensor Networks. Xueying Zhang, Howard M. Heys, and Cheng Li. Electrical and Computer Engineering. Faculty of Engineering and Applied Science

SmartBond DA Smallest, lowest power and most integrated Bluetooth 5 SoC. Applications DA14585

Introduction to cryptology (GBIN8U16)

Transcription:

Introducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine Alexis Alcott, Product Marketing Manager, MCU16 Division June 24, 2014

2 Announcing at Sensors Expo PIC24F GB2 MCUs for Protecting Data in Embedded Applications Hardware crypto engine (Industry-standard AES, DES, 3DES) Random Number Generator (RNG) One-Time-Programmable (OTP) Key Storage extreme Low Power Extends Battery Life 18 na Sleep, 180 µa/mhz Run Enabling Integrity of Data without Sacrificing Power Consumption Connection to USB or Wireless Protocols Integrated USB 2.0 Device, Host, OTG Easy Connection to Certified Modules for Wi-Fi, ZigBee, Sub-GHz, Bluetooth LE Ideal for IoT Sensor Nodes, Access Control Systems, Door Locks

3 Example Applications Industrial Security door locks Access control systems Security cameras POS terminals Smartcard readers Heat/Gas meters IoT sensor nodes Computer PC peripherals Printers Portable accessories Medical/Fitness Pedometers Wearable fitness Handheld devices

4 Integrated Crypto Engine Hardware Crypto Engine Industry Standards for AES, DES, 3DES Encryption, Decryption & Authentication Secure Data Transfer & Storage Random Number Generator Supporting True-Random and Pseudo-Random Numbers Reach a Higher Level of Data Security Reduces Possibility of Hacking Secure Key Storage for Additional Protection 512 bits OTP Key Storage Once Written, Keys cannot be Read or Overwritten by Software Stores up to 4 AES Keys or 8 DES Keys Advantages of Hardware Crypto over Software Implementation Less Software Overhead Frees Up CPU Bandwidth & Memory Operate at a Lower CPU Frequency to Save Power Another Example of Microchip s Core Independent Peripherals

PIC24 GB2 Block Diagram 5

6 Application Example: Electronic Door Lock Encryption for Security Bluetooth LE RN4020 Uses Crypto, RNG & Key Storage User data is encrypted Near Field Communication (NFC) PIC24FJ128GB204 Secure key storage extreme Low Power Magnetic Card UART Hardware encryption/ Secure Key storage MCU Core Digital I/O Display Unit Low power extends battery life Vbat with RTCC for battery backup Access Options Enter code manually via keypad Magnetic keycard 128KB Flash Vbat Wirelessly via Smartphone Key pad control (touch) CTMU Power Interrupt Door Latch Motor Control Unit

7 Flexible Development Tools Main Development Board Explorer 16 Board DM240002 $129.99 Processor Plug-In Modules PICtail Plus Daughter Cards PIC24FJ128GB204 Plug-In Module (USB) MA240036 $25.00 PIC24FJ128GA204 Plug-In Module (Non-USB) MA240037 $25.00 USB PICtail Plus Daughter Board AC164131 $60.00 Smart Card/SIM Card PICtail Daughter Board AC164141 $29.99 Wireless Daughter Cards RN4020 Bluetooth LE PICtail/PICtail Plus RN-4020-PICtail $49.00 Wi-Fi PICtail RN-171-PICtail $39.95 802.15.4/ZigBee MRF24J40MA PICtail Plus AC164134-1 $24.99 Sub-GHz MRF89XAM8A PICtail Plus AC164138-1 $39.99

8 PIC24F GB2 MCU Family: Low Power with Crypto Engine Embedded Applications in the Internet-Connected World Demand Secure Data & Long Battery Life PIC24F GB2 for Secure Data Transfer & Storage Hardware Crypto Engine Random Number Generator & Secure Key Storage PIC24F GB2 for extreme Low Power Longer battery life for portable applications PIC24F GB2 for Easy Connections Integrated USB Easy interface to certified Wi-Fi or Bluetooth LE modules www.microchip.com/pic24fj128gb204

Additional Materials Note: The Microchip name and logo, and PIC are registered trademarks of Microchip Technology Inc. in the U.S.A., and other countries. PICtail is a trademark of Microchip Technology Inc. in the U.S.A., and other countries. All other trademarks mentioned herein are property of their respective companies.

10 Availability & Pricing Part # USB Flash Pins Package PIC24FJ128GB204 Yes 128 KB 44 TQFP, QFN PIC24FJ128GB202 Yes 128 KB 28 SOIC, SSOP, QFN, SPDIP PIC24FJ64GB204 Yes 64 KB 44 TQFP, QFN PIC24FJ64GB202 Yes 64 KB 28 SOIC, SSOP, QFN, SPDIP PIC24FJ128GA204 No 128 KB 44 TQFP, QFN PIC24FJ128GA202 No 128 KB 28 SOIC, SSOP, QFN, SPDIP PIC24FJ64GA204 No 64 KB 44 TQFP, QFN PIC24FJ64GA202 No 64 KB 28 SOIC, SSOP, QFN, SPDIP Prices start at $1.30 in volume. All products available now for sampling & volume. Tape & Reel options available.

11 Support for All AES/DES Modes We support all of the modes within AES, DES, 3DES DES Encryption/Decryption Half-duplex operation Selectable between DES or Triple DES (3DES) 56-bit Key with support for 2-key or 3-key E-D-E/D-E-D Triple DES 64-bit Block Size ECB, CBC, CFB, OFB and CTR modes AES Encryption/Decryption Half-duplex operation 128-bit, 192-bit or 256-bit Key 128-bit Block Size ECB, CBC, CFB, OFB and CTR modes

Crypto Modes ECB Electronic codebook The simplest of the encryption modes is the electronic codebook (ECB) mode. The message is divided into blocks, and each block is encrypted separately. CBC Cipher-block chaining IBM invented the cipher-block chaining (CBC) mode of operation in 1976. In CBC mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block. CFB Cipher feedback The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB decryption is almost identical to CBC encryption performed in reverse. OFB Output feedback The output feedback (OFB) mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error correcting codes to function normally even when applied before encryption. CTR Counter Like OFB, counter mode turns a block cipher into a stream cipher. It generates the next keystream block by encrypting successive values of a "counter". The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is the simplest and most popular. CTR mode has similar characteristics to OFB, but also allows a random access property during decryption. CTR mode (CM) is also known as integer counter mode (ICM) and segmented integer counter (SIC) mode. Modes of operation are nowadays defined by a number of national and internationally recognized standards bodies. Notable standards organizations include NIST, ISO (with ISO/IEC 10116), the IEC, the IEEE, the national ANSI, and the IETF Source: http://en.wikipedia.org/wiki/block_cipher_mode_of_operation 12

13 Key Storage/Management Software Keys Keys stored in Flash or SRAM Keys are accessible by software Keys with 512-bit OTP Storage Keys are never exposed to software No key erase or modification Software only indicates which OTP key should be used Encrypted Software Keys Encrypted keys are stored in the Flash or SRAM OTP Key is dedicated as Key Encryption Key (KEK) Software is never exposed to unencrypted keys (programmatically secure) Randomly Generated Keys Keys are generated randomly by the hardware Software is never exposed to keys (programmatically secure) Can direct hardware to encrypt keys for transmission

14 Key Storage - OTP Stores up to 512 bits OTP 4 keys for AES (128 bit key) 2 keys for AES (256 bit key) 8 keys for DES (64 bit key) OTP One Time Programmable Fuse based Cannot be read or overwritten after locked