{"id":14398,"date":"2018-02-14T06:17:43","date_gmt":"2018-02-14T06:17:43","guid":{"rendered":"https:\/\/www.revoscience.com\/en\/?p=14398"},"modified":"2020-05-27T06:11:50","modified_gmt":"2020-05-27T06:11:50","slug":"energy-efficient-encryption-internet-things","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/energy-efficient-encryption-internet-things\/","title":{"rendered":"Energy-efficient encryption for the internet of things"},"content":{"rendered":"<p style=\"text-align: justify\"><span style=\"color: #000000\"><strong><em>Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold.<\/em><\/strong><\/span><\/p>\n<figure id=\"attachment_14399\" aria-describedby=\"caption-attachment-14399\" style=\"width: 621px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-14399\" src=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg\" alt=\"\" width=\"621\" height=\"421\" title=\"\"><figcaption id=\"caption-attachment-14399\" class=\"wp-caption-text\">MIT researchers have built a new chip, hardwired to perform public-key encryption, that consumes only 1\/400 as much power as software execution of the same protocols would. It also uses about 1\/10 as much memory and executes 500 times faster.<\/figcaption><\/figure>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">CAMBRIDGE, MASS.&#8211;Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">Public-key encryption protocols are complicated, and in computer networks, they\u2019re executed by software. But that won\u2019t work in the internet of things, an envisioned network that would connect many different sensors \u2014 embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags \u2014 to online servers. Embedded sensors that need to maximize battery life can\u2019t afford the energy and memory space that software execution of encryption protocols would require.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">MIT researchers have built a new chip, hardwired to perform public-key encryption, that consumes only 1\/400 as much power as software execution of the same protocols would. It also uses about 1\/10 as much memory and executes 500 times faster. The researchers describe the chip in a paper they\u2019re presenting this week at the International Solid-State Circuits Conference.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">Like most modern public-key encryption systems, the researchers\u2019 chip uses a technique called elliptic-curve encryption. As its name suggests, elliptic-curve encryption relies on a type of mathematical function called an elliptic curve. In the past, researchers \u2014\u00a0<a style=\"color: #000000\" href=\"http:\/\/mit.pr-optout.com\/Tracking.aspx?Data=HHL%3d826%2f%3e1-%3eLCE9%3b4%3b8%3f%26SDG%3c90%3a.&amp;RE=MC&amp;RI=4334046&amp;Preview=False&amp;DistributionActionID=46654&amp;Action=Follow+Link\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/mit.pr-optout.com\/Tracking.aspx?Data%3DHHL%253d826%252f%253e1-%253eLCE9%253b4%253b8%253f%2526SDG%253c90%253a.%26RE%3DMC%26RI%3D4334046%26Preview%3DFalse%26DistributionActionID%3D46654%26Action%3DFollow%2BLink&amp;source=gmail&amp;ust=1518674649584000&amp;usg=AFQjCNG37VaRYNmzooMubSeh0OOJ1NuOZQ\">including<\/a>\u00a0the same MIT group that developed the new chip \u2014 have built chips hardwired to handle specific elliptic curves or families of curves. What sets the new chip apart is that it is designed to handle any elliptic curve.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">\u201cCryptographers are coming up with curves with different properties, and they use different primes,\u201d says Utsav Banerjee, an MIT graduate student in electrical engineering and computer science and first author on the paper. \u201cThere is a lot of debate regarding which curve is secure and which curve to use, and there are multiple governments with different standards coming up that talk about different curves. With this chip, we can support all of them, and hopefully, when new curves come along in the future, we can support them as well.\u201d<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">Joining Banerjee on the paper are his thesis advisor, Anantha Chandrakasan, dean of MIT\u2019s School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science; Arvind, the Johnson Professor in Computer Science Engineering; and Andrew Wright and Chiraag Juvekar, both graduate students in electrical engineering and computer science.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\"><strong>Modular reasoning<\/strong><\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">To create their general-purpose elliptic-curve chip, the researchers decomposed the cryptographic computation into its constituent parts. Elliptic-curve cryptography relies on modular arithmetic, meaning that the values of the numbers that figure into the computation are assigned a limit. If the result of some calculation exceeds that limit, it\u2019s divided by the limit, and only the remainder is preserved. The secrecy of the limit helps ensure cryptographic security.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">One of the computations to which the MIT chip devotes a special-purpose circuit is thus modular multiplication. But because elliptic-curve cryptography deals with large numbers, the chip\u2019s modular multiplier is massive. Typically, a modular multiplier might be able to handle numbers with 16 or maybe 32 binary digits, or bits. For larger computations, the results of discrete 16- or 32-bit multiplications would be integrated by additional logic circuits.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">The MIT chip\u2019s modular multiplier can handle 256-bit numbers, however. Eliminating the extra circuitry for integrating smaller computations both reduces the chip\u2019s energy consumption and increases its speed.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">Another key operation in elliptic-curve cryptography is called inversion. Inversion is the calculation of a number that, when multiplied by a given number, will yield a modular product of 1. In previous chips dedicated to elliptic-curve cryptography, inversions were performed by the same circuits that did the modular multiplications, saving chip space. But the MIT researchers instead equipped their chip with a special-purpose inverter circuit. This increases the chip\u2019s surface area by 10 percent, but it cuts the power consumption in half.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">The most common encryption protocol to use elliptic-curve cryptography is called the datagram transport layer security protocol, which governs not only the elliptic-curve computations themselves but also the formatting, transmission, and handling of the encrypted data. In fact, the entire protocol is hardwired into the MIT researchers\u2019 chip, which dramatically reduces the amount of memory required for its execution.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">The chip also features a general-purpose processor that can be used in conjunction with the dedicated circuitry to execute other elliptic-curve-based security protocols. But it can be powered down when not in use, so it doesn\u2019t compromise the chip\u2019s energy efficiency.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold. CAMBRIDGE, MASS.&#8211;Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key. Public-key encryption protocols are complicated, and in computer networks, they\u2019re executed by software. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14399,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,22,17],"tags":[],"class_list":["post-14398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-science","category-other","category-research"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0-150x150.jpg",150,150,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",95,63,false],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",479,320,false],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",96,64,false],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2018\/02\/MIT-Security-Chip_0.jpg",150,100,false]},"author_info":{"info":["Amrita Tuladhar"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/computer-science\/\" rel=\"category tag\">Computer Science<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/other\/\" rel=\"category tag\">Other<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/research\/\" rel=\"category tag\">Research<\/a>","tag_info":"Research","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/14398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=14398"}],"version-history":[{"count":0,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/14398\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/14399"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=14398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=14398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=14398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}