Professional Documents
Culture Documents
Honeywell.com
The development
A new algorithm (called BeepBeep) overcomes the drawbacks of using existing cryptography for real-time systems
Honeywell Proprietary
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Honeywell Proprietary
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
The above must be accomplished by use of very little processing power Ditto memory resourcesideally only processor registers In retrofit applications, the incremental power requirement must be zero, or very small Security time horizon is usually tactical versus strategic
Integrity needed only until next key change Secrecy (depends on type of data)
Control for a few hours Inventory for a few weeks or months Recipe for a few decades (but little such data is sent)
Honeywell.com
Honeywell.com
Honeywell Proprietary
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Systems typically use repeating execution time-slots of fixed size startup overhead increases size of all time slots Central control changes key for each message (high key agility), which needs a large crypto-cache or (re-)startup cost for each message
Honeywell Proprietary
Honeywell.com
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Achieving Speed
Use an efficient stream cipher State stays in CPU registers (no RAM used) Fix problems with conventional implementations
Feedback shift registers are slow in software
Invention improves speed by almost 100 times
Multiply is slow
Becoming faster (from 42 clocks to 1//4 clocks) Invention uses multiply in a powerful new way
Honeywell Proprietary
Honeywell.com
63 lfsr[2] lfsr[1]
XOR
1 lfsr[0] 0
ctl
step 64 bits
lfsr[3]
31 clock
{lfsr[0], lfsr[2] }
{lfsr[2], lfsr[1] }
{lfsr[1], lfsr[2] }
state
sum
+ `
m
upper 32 bits
+ `
lower 32 bits
+/decrypt encrypt
XOR
Honeywell Proprietary
Honeywell.com
Broadcast Authentication
Real-time and embedded systems cannot afford public key encryption or multiple algorithms for authentication Simple symmetric key cant be used because the compromise of any node compromises the whole net Solution for simple broadcast commands: use BeepBeep both for encryption and for a one-way function hash
At net initialization, the broadcaster sends to each node the result of repeatedly hashing a secret truly random number (the message uses each nodes individual key for authentication and integrity) To send an authentic command, a value is broadcast which hashes to the value each node has stored If a node gets a transmission which hashes to its stored value, it performs the command and updates its stored hash value
Honeywell Proprietary
Honeywell.com
Several thousand times faster and smaller than public key 1:1 byte replacement (to fit existing message sizes)
Can eliminate need for the addition of an explicit IV Can incorporate existing CRC or checksum into integrity
Optimized for CPUs typically found in embedded, real time, control, and communication systems Designed to be resistant to specialized hardware cracking
16 Document control number Honeywell Proprietary
Honeywell.com
Honeywell Proprietary
Honeywell.com
Withstanding Attacks
Chosen plaintext
Generally not feasible; requires such invasive physical access that it would be easier just to read out the key(s)
Chosen ciphertext
Try send fake messages and watch for response (reaction attack) Integrity mechanism(s) reject most forgeries Bandwidth is so low, only a miniscule amount of data could be sent before source is detected and stopped
Known plaintext
Bandwidth is too low to accumulate many cipher-plain pairs
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Access and control of remote sites (homes, buildings) physical security, load shedding, medical equipment Radio communications
Aircraft Mobile phones
Low-power/battery-operated devices, scatterable sensors, mines, satellites, intrinsic safety areas Real-time multimedia communications
Honeywell Proprietary
Honeywell.com
Modem
Modem
Modem
Modem
RTU
21 Document control number
RTU
RTU
RTU
Honeywell Proprietary
Honeywell.com
Retrofitting Security
Controller
Modem
Modem
Modem
Modem
RTU
22 Document control number
RTU
RTU
RTU
Honeywell Proprietary
Honeywell.com
Honeywell Proprietary
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Honeywell.com
Internet
ISP POP
Internet Interface
/ RN P U DP / IP
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Inventor
Kevin.Driscoll@Honeywell.com +1 612-951-7263
Some applicable Driscoll patents (US numbers):
6,804,354 Cryptographic Isolator Using Multiplication 6,763,363 Computer Efficient Linear Feedback Shift Register 6,760,440 One's [sic] Complement Cryptographic Combiner 7,277,543 Cryptographic Combiner Using Two Sequential NonAssociative Operations
Further Patents Pending
28 Document control number Honeywell Proprietary
Honeywell.com
Topics
BeepBeep Technology Overview Requirements for Real-Time Cryptography Deficiencies of Conventional Encryption for this Overview of BeepBeeps Mechanism Applications/Market Opportunities Development Status Inventors Other Honeywell Technology Featured Today
Honeywell Proprietary
Honeywell.com
Genetic Algorithm
Optimum network path considering speed, cost, reliability, etc.
Honeywell.com
Honeywell Proprietary
Honeywell.com
One-Slide Version
Honeywell Proprietary
Honeywell.com
Wireless-Specific
Multi-use wireless for noisy environments, e.g., industrial (OneWireless) Robustness and power conservation