The implementation and performance/cost/power analysis of the network security accelerator on SoC applications


 Jonas Parks
 2 years ago
 Views:
Transcription
1 The implementation and performance/cost/power analysis of the network security accelerator on SoC applications RueiTing Gu KuoHuang Chung IngJer Huang Abstract The internet is going deep into human life, there are more and more applications around us connected tightly with it, and the network security is become more and more important. The and AES are the most popular standards using in network security, and many protocols have included them. Because enciphering is a computation intensive work so that we may use hardware accelerators to offload CPU s loading. We propose the analysis of performance, cost and power which is helpful for designing a network SoC in the beginning. For this reason we implement the /AES hardware accelerator. The experiment results tell us that we only need 2979/74345 gates respectively to gain 3000 times faster, it is a very worth investment. The /AES accelerators run at 83 and 70 MHz with 3.3 V core voltage and have 12.86% and 64.16% power consumption in additional, but if the ratio of over whole program exceeds 11.4% or AES exceeds 39.95%, the system energy consumption will go down because the computing time is reduced. Key words: network security, hardware accelerator, performance/cost/power analysis, network SoC chip. 1 Introduction With the development of Internet, there are more and more applications around us connected tightly with it, and the network security is become more and more important. Because it is imposable to prevent someone from intercepting the network packages, especially who did it on purpose. But we still have to protect our, so we can only encipher the that whoever get the but can not read it. For the enciphering the (Data Encryption Standard) [1] and AES (Advanced Encryption Standard) [2] are the most popular standards used in many protocols like i, WAP, etc. But the computation is exhaustive for a low cost SoC that we usually need a hardware accelerator to offload the CPU loading. There are already some accelerators, and we want to know the performance, cost, and power consumption. It is helpful to design a network security specific SoC in the beginning. For measuring the performance, cost, and power consumption we implement the /AES hardware accelerators. We experiment the performance comparing with software implementation and analysis that how much performance is improved, how much cost and how much power consumption. The organization of the rest of this paper is as follows. The section 2 is related work which introduces the and AES standard, how it works with the and some existing hardware accelerators. Section 3 is our hardware platform implementation for experimenting and analysis. There are the experiment results and analysis in section 4 and final the conclusion is section 5. 2 Related work In this section we will probe into encryption about network security. The and AES are the most popular encryption standards with high speed and enough strength to protect the information. They are using symmetric cipher for fast computation. Although the symmetric way may not have enough strength than the asymmetric way like RSA [3] but they use more than 64 bits key to improve the security. By using symmetric cipher it is much easier to implement into hardware as accelerator. 2.1 algorithm cryptographic algorithm is used to protect civilian satellite communications, gateway servers, settop boxes, Virtual Private Networks (VPN), video transmissions, and numerous other transfer applications. This algorithm is designed to encipher and decipher blocks of consisting of 64 bits under control of a 64bit key. Deciphering must be accomplished by using the same key as for enciphering, but with the schedule of addressing the key bits altered so that the deciphering process is the reverse of the enciphering process. For now the CPU speed is more and more fast (for now is over 3 GHz), the may not strong enough to protect and then the TDEA (Triple Data Encryption Algorithm or called Triple) is appeared. TDEA used three keys to encipher 3 times with : it uses 1st key to encipher then the 2nd key to decipher and then 3rd key to encipher again. If we want to decipher a TDEA we have to use the 3rd to decipher first then the 2nd key to encipher then the 1st key to decipher and get the original. 2.2 AES algorithm This AES standard specifies the Rijndael algorithm ([2] and [6]), a symmetric block cipher that can process blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits. It is more complex than but earn much more security. The algorithm may be used with the three different key lengths indicated above, and therefore these different flavors may be referred to as,, and. Hence, at the beginning of the Cipher or Inverse Cipher, the input array_in, is copied to the State and through the AES process functions AddRoundKey(), SubBytes(), ShiftRows(), MixColumns(). The core computation in each function uses
2 ExclusiveOR and Multiplication operations in the finite field. There are some researches about the hardware implementations like C.C.Wang[7] designed a VLSI hardware for computing multiplications and inverse, A.V. Dinh[8] implemented a low latency architecture for computing multiplicative inverses and divisions, and Jing, M.H.[9] designed a fast inverse module in AES. 3 Hardware accelerator implementation 3.1 Hardware acceleration platform To integrate the hardware accelerators into SoC we choice the ARM based CPU platform and follow the ARM7TDMI coprocessor interface [10] for the maximum compliance. Figure 1 is the integrated system block diagram shows the I/O pins of the coprocessor connected to ARM7TDMI. The ncpi, CPA and CPB connect to ARM7TDMI s ncpi, CPA and CPB pins respectively, and all components connect to the System Bus (may be AMBA). CPA/CPB INPUT INITIAL PERMUTATION 1 0 round f L n = R n1 R n = L n1 f(r n1, K n ) INVERSE INITIAL PERMUTATION K n OUTPUT ARM7TDI Core ncpi CoP0 CoP1 AES Memory Figure 2  iteration architecture System Bus Figure 1  Integrated system The CoP0 is coprocessor 0 which is the accelerator and CoP1 is AES accelerator. 3.2 The design of hardware accelerator The core of computation is the 16 times L n = R n1 and (1) R n = L n1 f(r n1, K n), (2) therefore we considering the implementation in two different ways: 1. Fully parallel design: We can duplicate the L n = R n1 and R n = L n1 f(r n1, K n) hardware circuit for 16 copies and finish the computation in 1 cycle. 2. Sequential design: We can use single hardware circuit but run 16 rounds to finish the computation. The first way to implement hardware is the fastest way that it can finish the computation in one single cycle. But the cost is too much to gain the benefit, and may become critical path of the whole system so that it may slow down the system speed. For this reason, we pick the second way to implement our hardware accelerator. The figure 2 shows the architecture of our design, for each 64but would take 16 cycles. Figure 3 shows the control flow for AddRoundKey() function. Figure 4 shows the whole hardware design; there are two parts in this design first the Key Schedule takes the responsibility to produce 16 Keys for each round and then according the round keys to encipher or decipher. Start Enter Input Data / Input Key Key Schedule Encryption/ Decryption Counter ++ Counter > 16 Yes Get Result Figure 3  The flow chart of software program NO
3 Round KeyIn Encryption Round == 0 [33:64] Key Schedule Input Data IP 1 0 [33:64] [1:32] F IIP Output Data Figure 4  algorithm block diagram KeyIn The design of AES hardware accelerator The architecture of AES hardware can divided two parts also, the first part is key expansion then uses the keys to encipher or decipher. In this hardware we followed Jing, M.H.[9] to implement the multiplier in finite field; and used table lookup to implement the Sbox which is considerably used in SubBytes() and SubWord() functions. Figure 5 shows the block diagram of AES hardware accelerator architecture. KeyIn 5 KeyIn 4 KeyIn 3 KeyIn 0 KeyIn 1 KeyIn KeyIn 7 Rot Sub Sub 2 Rcon 4 Figure 6 AES integrated parallel Key Expansion Encryption Input Data round Encryption Module keyin keylength keyround Key Expansion Data Output Decryption Module Figure 5  The block diagram of complete circuit of AES The core computation of AES is the key expansion, and is complex also. Because there are varied key lengths of AES key (,, and ), so that we use 4 multiplaxtor to take control of the path like figure 6 shows. The 1 st mux would let left way pass if it is key length or else it let right way pass through. The mux 2 nd and 3 rd would let up and left way pass respectively in or else it would take down and right respectively. The last 4 th will choice up way for or the middle for or the bottom for. 4 Experiment result and analysis 4.1 /AES hardware accelerator performance We compared the hardware performance with the pure software solutions which is written in C compiled with ADS 1.2 (ARM C compiler), and the result is shown in table 1. We encipher 3 different size packages with,,, and respectively, and count the cycles to finish the jobs. The performance improvement is about times faster than software solutions.
4 4.2 Cost and Power consumption Our hardware accelerators are implemented with verilog RTL code and synthesize with Synopsysy Design AnalyzerTM using TSMC 0.35µm process. The and AES results are shown in table 2 and table 3 respectively. The area (gate count) of is and the cycle time is ns. Comparing with the InventraTM Encryption core [11] which is a commercial product, our speed is slower for 2.06 ns but the area is smaller for 1000 gates (25%). The result is shown in table 4. The area of AES module is gates the cycle time is ns, and the maximum throughput is 897 Mbps, comparing with the Ocean Logic TM (OL) [12] AES module (Table 5) our performance is about 3.63 times faster in cycle count. Because the OL AES module uses ASIC 0.18 process and runs at 200 MHz frequency so that the throughput is about the same. We also implement an ARM compatible CPU core for the platform and the power consumption is mw. The power consumption of CPU+ module, which run at 83 MHz and the core voltage is 3.3 V, is mw. The power consumption of CPU+AES module running at 70 MHz with 3.3 V core voltages is mw. The /AES module added 12.86% and 64.16% of power respectively. The performance/cost ratio tells us that we spending 2978/74345 gates cost and a little power to gain 3000 times faster performance is a worthily and wisely choice. Although there may be some power consumption adding into the SoC system; for the hardware view it is consumed more power, but for the task view in the SoC system it can shorten the computing time very much and may save more energy than it consumed. For example to finish a /AES task the hardware accelerator needs 1 second and the software solution needs up to 3000 seconds, the energy consumption of the system with accelerator is definitely smaller than which without accelerator. According to the Amdahl s Law: Execution Time affected by improvement + Execution Time unaffected Amount of improvement And the Energy = power * cycle count * cycle time It tells us that if the ratio of over whole program exceeds 11.4 % the system energy consumption will go down. For AES the ratio is %. Table 6 shows the details of each module. Software Hardware 48byte byte byte Table 1  The hardware/software performance comparing result module synthesis results Synopsys Design Analyzer TSMC 0.35 µm Gate Count Power (mw) Votage: 3.3V, Frequency: 83MHz Cycle time (ns) Cycle / block 16 MAX Throughput (Mbps) 333 Table 2  module synthesis results with TSMC 0.35µm process AES module synthesize results TSMC 0.35µm Gate Count Cycle time (ns) Power (mw) Voltage: 3.3V, Frequency: MHz KE cycles Cipher cycles KE Throughput (Mbps) Cipher throughput (Mbps) Table 3  AES module synthesis results with TSMC 0.35µm process
5 Gate count Cycle time(ns) Our core Inventra TM core Table 4  Compare with InventraTM core OL_KEXP_E D OL_AES_ED Our Key Expansion Our AES Improvement (OL / Our design) Average Improvement 3.63 Table 5  Compare the cycle count with OL module Rijndael document Version 2, May 9, [7] C.C. Wang, T.K. Truong, H.M. Shao, L.J. Deutsch, J.K. Omura, and I.S. Reed, VLSI architecture for computing multiplications and inverse in GF(2 m ), IEEE Transactions on Computer, Volume C34, No. 6, August 1985 [8] A.V. Dinh, R.J. Bolton, and R. Mason, A Low Latency Architecture for Computing Multiplicative Inverses and Divisions in GF(2m), IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, Volume 48, No. 8, August 2001 [9] Jing, M.H.; Chen, Y.H.; Chang, Y.T.; Hsu, C.H., The design of a fast inverse module in AES, International Conferences on Infotech and Infonet, 2001, Volume: 3, Page(s) : [10] ARM7TDMI Data Sheet [11] Inventra TM, core, Encryption core, [12] Ocean Logic TM, OL_AES AES Core family Rev 1.4, Module Minimal ratio of feature related computation ARM % ARM % ARM % ARM % Table 6  Minimal ratio of feature related computation 5 Conclusion We propose the performance/cost/power information about the network security hardware accelerator on SoC, and to measure the we implement the /AES modules using ARM7TDMI coprocessor interface on ARM based SoC. It is a worth investment in spending a little cost but gaining much more performance (over 3000 times faster). The /AES accelerators run at 83 and 70 MHz with 3.3 V core voltage and have 12.86% and 64.16% power consumption in additional, but if the ratio of over whole program exceeds 11.4% or AES exceeds 39.95%, the system energy consumption will go down because the computing time is reduced. 6 Reference [1] NIST, Data Encryption Standard, FIPS PUB 463, October 25, 1999 [2] NIST, Advanced Encryption Standard, FIPS PUB 197, November 26, 2001 [3] Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems. Communications of the ACM, 21 (2), pp , February [4] [5] f [6] Joan Daemen, Vincent Rijmen, AES Proposal:
Implementation of Full Parallelism AES Encryption and Decryption
Implementation of Full Parallelism AES Encryption and Decryption M.Anto Merline M.ECommuication Systems, ECE Department K.Ramakrishnan College of EngineeringSamayapuram, Trichy. AbstractAdvanced Encryption
More informationImplementation and Design of AES SBox on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2329364, ISSN (Print): 2329356 Volume 3 Issue ǁ Jan. 25 ǁ PP.94 Implementation and Design of AES SBox on FPGA Chandrasekhar
More informationIJESRT. [Padama, 2(5): May, 2013] ISSN: 22779655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
More informationsynthesizer called C Compatible Architecture Prototyper(CCAP).
Speed Improvement of AES Encryption using hardware accelerators synthesized by C Compatible Architecture Prototyper(CCAP) Hiroyuki KANBARA Takayuki NAKATANI Naoto UMEHARA Nagisa ISHIURA Hiroyuki TOMIYAMA
More informationHigh Speed Software Driven AES Algorithm on IC Smartcards
SCIS 2004 The 2004 Symposium on Cryptography and Information Security Sendai, Japan, Jan.2730, 2004 The Institute of Electronics, Information and Communication Engineers High Speed Software Driven AES
More informationDesign and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSRJVSP) Volume 5, Issue, Ver. III (Jan  Feb. 205), PP 0 eissn: 239 4200, pissn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
More informationHardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 13731377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
More informationELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions
Assignment ELECTENG702 Advanced Embedded Systems Improving AES128 software for Altera Nios II processor using custom instructions October 1. 2005 Professor Zoran Salcic by Kilian Foerster 108 Claybrook
More informationSeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
More informationResearch Article. ISSN 23479523 (Print) *Corresponding author Shihai Zhu Email:
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(3A):352357 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationMultiLayered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 MultiLayered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
More informationImproving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES
Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES K Anjaneyulu M.Tech Student, Y.Chalapathi Rao, M.Tech, Ph.D Associate Professor, Mr.M Basha,
More informationDesign and Verification of AreaOptimized AES Based on FPGA Using Verilog HDL
Design and Verification of AreaOptimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
More informationFPGA IMPLEMENTATION OF AN AES PROCESSOR
FPGA IMPLEMENTATION OF AN AES PROCESSOR Kazi Shabbir Ahmed, Md. Liakot Ali, Mohammad Bozlul Karim and S.M. Tofayel Ahmad Institute of Information and Communication Technology Bangladesh University of Engineering
More informationThe Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception  Why A New Cipher? Conception  Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56bit key was too small Too slow
More informationDesign of an EncryptionDecryption Module Oriented for Internet Information Security SOC Design
Design of an EncryptionDecryption Module Oriented for Internet Information Security SOC Design Yixin Liu, Haipeng Zhang, Tao Feng School of Electronics & Information, Hangzhou Dianzi University, Hangzhou,
More informationParallel AES Encryption with Modified Mixcolumns For Many Core Processor Arrays M.S.Arun, V.Saminathan
Parallel AES Encryption with Modified Mixcolumns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.
More informationNetwork Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers  Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
More informationThe Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
More informationFPGA IMPLEMENTATION OF AES ALGORITHM
FPGA IMPLEMENTATION OF AES ALGORITHM S.A. Annadate 1, Nitin Ram Chavan 2 1,2 Electronics and Telecommunication Dept, J N Collage of engineering Aurangabad, (India) ABSTRACT Advanced Encryption Standard
More informationA Comparative Study of Applying Real Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)
More informationCombining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
More informationAES1. UltraCompact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications
General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (start at 800 Actel tiles). Enhanced versions
More informationInternational Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 22790020 ISSN (Online): 22790039 International
More informationEfficient Software Implementation of AES on 32bit Platforms
Efficient Software Implementation of AES on 32bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano  Italy Pasqualina Lilli Lilli Fragneto ASTLAB of ST Microelectronics, Agrate
More informationEnhancing Advanced Encryption Standard SBox Generation Based on Round Key
Enhancing Advanced Encryption Standard SBox Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
More informationProperties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
More informationSurvey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationFast Implementations of AES on Various Platforms
Fast Implementations of AES on Various Platforms Joppe W. Bos 1 Dag Arne Osvik 1 Deian Stefan 2 1 EPFL IC IIF LACAL, Station 14, CH1015 Lausanne, Switzerland {joppe.bos, dagarne.osvik}@epfl.ch 2 Dept.
More informationHardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner
Hardware Implementations of RSA Using Fast Montgomery Multiplications ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner Overview Introduction Functional Specifications Implemented Design and Optimizations
More informationAn Instruction Set Extension for Fast and MemoryEfficient AES Implementation
An Instruction Set Extension for Fast and MemoryEfficient AES Implementation Stefan Tillich, Johann Großschädl, and Alexander Szekely Graz University of Technology Institute for Applied Information Processing
More informationA Secure Software Implementation of Nonlinear Advanced Encryption Standard
IOSR Journal of VLSI and Signal Processing (IOSRJVSP) ISSN: 2319 4200, ISBN No. : 2319 4197 Volume 1, Issue 5 (Jan.  Feb 2013), PP 4448 A Secure Software Implementation of Nonlinear Advanced Encryption
More informationThe Data Encryption Standard (DES)
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today  symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
More informationDesign and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
More informationAnalysis of Security Algorithms in Cloud Computing
Analysis of Security s in Cloud Computing Randeep Kaur 1,Supriya Kinger 2 1 Student Masters Of Technology, Shri Guru Granth Sahib World University, Fatehgarh Sahib. 2 Assistant Professor, Shri Guru Granth
More informationAES Power Attack Based on Induced Cache Miss and Countermeasure
AES Power Attack Based on Induced Cache Miss and Countermeasure Guido Bertoni, Vittorio Zaccaria STMicroelectronics, Advanced System Technology Agrate Brianza  Milano, Italy, {guido.bertoni, vittorio.zaccaria}@st.com
More informationA PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
More informationPerformance Evaluation of AES using Hardware and Software Codesign
Performance Evaluation of AES using Hardware and Software Codesign Vilas V Deotare 1, Dinesh V Padole 2 Ashok S. Wakode 3 Research Scholar,Professor, GHRCE, Nagpur, India vilasdeotare@gmail.com 1, dvpadole@gmail.com
More informationThe Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
More informationAutomata Designs for Data Encryption with AES using the Micron Automata Processor
IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.7, July 2015 1 Automata Designs for Data Encryption with AES using the Micron Automata Processor Angkul Kongmunvattana School
More informationArea Optimized and Pipelined FPGA Implementation of AES Encryption and Decryption
Area Optimized and Pipelined FPGA Implementation of AES Encryption and Decryption 1, Mg Suresh, 2, Dr.Nataraj.K.R 1, Asst Professor Rgit, Bangalore, 2, Professor 1,2, Department Of Electronics And Communication
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationModern Block Cipher Standards (AES) Debdeep Mukhopadhyay
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA 721302 Objectives Introduction
More informationAES (Rijndael) IPCores
AES (Rijndael) IPCores Encryption/Decryption and Key Expansion Page 1 Revision History Date Version Description 24 February 2006 1.0 Initial draft. 15 March 2006 1.1 Block diagrams added. 26 March 2006
More informationAStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationLesson 7: SYSTEMON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter1L07: "Embedded Systems  ", Raj Kamal, Publs.: McGrawHill Education
Lesson 7: SYSTEMON ONCHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of highlevel components Possess gatelevel sophistication in circuits above that of the counter,
More informationSecret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
More informationARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, FIPS Publication 463 (reaffirmed October 25, 1999), was withdrawn on May 19, 2005 and is provided here only for historical purposes. For related information,
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 PublicKey Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown PublicKey Cryptography
More informationAN IMPLEMENTATION OF HYBRID ENCRYPTIONDECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSAAES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTIONDECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
More informationNetwork Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
More informationPolymorphic AES Encryption Implementation
Polymorphic AE Encryption Implementation Ricardo Chaves, Leonel ousa Instituto uperior Técnico / INECID Portugal, Lisbon Email: ricardo.chaves@inescid.pt Georgi Kuzmanov, tamatis Vassiliadis Computer
More informationFPGA Implementation of RSA Encryption Engine with Flexible Key Size
FPGA Implementation of RSA Encryption Engine with Flexible Key Size Muhammad I. Ibrahimy, Mamun B.I. Reaz, Khandaker Asaduzzaman and Sazzad Hussain Abstract An approach to develop the FPGA of a flexible
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 81
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 81 Goals v understand principles of network security: cryptography and its many uses beyond
More informationAdvanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7
Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
More informationAdvanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5
Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
More informationRijndael Encryption implementation on different platforms, with emphasis on performance
Rijndael Encryption implementation on different platforms, with emphasis on performance KAFUUMA JOHN SSENYONJO Bsc (Hons) Computer Software Theory University of Bath May 2005 Rijndael Encryption implementation
More informationCS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIENCHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IPOSI Architecture Network Types LAN WAN
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
More informationPavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April2015 965 OPTIMIZATION OF AES ALGORITHM USING HARDWARE AND SOFTWARE Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V AbstractIn
More informationNetwork Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 035742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 035742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
More information7a. Systemonchip design and prototyping platforms
7a. Systemonchip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is SystemonChip (SoC)? Systemonchip is an integrated circuit
More informationKeywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
More informationSeparable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationA HARDWARE IMPLEMENTATION OF THE ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM USING SYSTEMVERILOG
A HARDWARE IMPLEMENTATION OF THE ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM USING SYSTEMVERILOG Bahram Hakhamaneshi B.S., Islamic Azad University, Iran, 2004 PROJECT Submitted in partial satisfaction
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationEvaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
More informationCut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entryto midlevel VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entryto midlevel VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
More informationA Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur152004) **(Department
More informationData Encryption A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. we would encrypt the string IDESOFMARCH as follows:
Data Encryption Encryption refers to the coding of information in order to keep it secret. Encryption is accomplished by transforming the string of characters comprising the information to produce a new
More informationSymantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
More informationPower Reduction Techniques in the SoC Clock Network. Clock Power
Power Reduction Techniques in the SoC Network Low Power Design for SoCs ASIC Tutorial SoC.1 Power Why clock power is important/large» Generally the signal with the highest frequency» Typically drives a
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS70006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationSpecification of Cryptographic Technique PCMACAES. NEC Corporation
Specification of Cryptographic Technique PCMACAS NC Corporation Contents 1 Contents 1 Design Criteria 2 2 Specification 2 2.1 Notations............................................. 2 2.2 Basic Functions..........................................
More informationOPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps
More informationProcessor Accelerator for AES
1 Processor Accelerator for AES Ruby B. Lee and YuYuan Chen Department of Electrical Engineering Princeton University rblee, yctwo@princeton.edu Abstract Software AES cipher performance is not fast enough
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an applicationlevel protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationA Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationIMPLEMENTATION OF BACKEND SYNTHESIS AND STATIC TIMING ANALYSIS OF PROCESSOR LOCAL BUS(PLB) PERFORMANCE MONITOR
International Journal of Engineering & Science Research IMPLEMENTATION OF BACKEND SYNTHESIS AND STATIC TIMING ANALYSIS OF PROCESSOR LOCAL BUS(PLB) PERFORMANCE MONITOR ABSTRACT Pathik Gandhi* 1, Milan Dalwadi
More informationAn Energy Efficient ATM System Using AES Processor
www.seipub.org/eer Electrical Engineering Research (EER) Volume 1 Issue 2, April 2013 An Energy Efficient ATM System Using AES Processor Ali Nawaz *1, Fakir Sharif Hossain 2, Khan Md. Grihan 3 1 Department
More informationHardwareSoftware Codesign in Embedded Asymmetric Cryptography Application a Case Study
HardwareSoftware Codesign in Embedded Asymmetric Cryptography Application a Case Study Martin Šimka1, Viktor Fischer 2, and Miloš Drutarovský 1 1 Department of Electronics and Multimedia Communications,
More informationEFFECTIVE AES IMPLEMENTATION
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 7, Issue 1, JanFeb 2016, pp. 0109, Article ID: IJECET_07_01_001 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=7&itype=1
More informationTask Parallelism using Distributed Computing for Encryption and Decryption
International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 Task Parallelism using Distributed Computing for Encryption and Decryption Ms. Pallavi S. Shendekar *, Prof.
More informationImproved Method for Parallel AESGCM Cores Using FPGAs
Improved Method for Parallel GCM Cores Using FPGAs Karim Moussa Ali Abdellatif, Roselyne ChotinAvot, abib Mehrez To cite this version: Karim Moussa Ali Abdellatif, Roselyne ChotinAvot, abib Mehrez.
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationLecture 5  Cryptography
CSE497b Introduction to Computer and Network Security  Spring 2007  Professors Jaeger Lecture 5  Cryptography CSE497b  Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497bs07/
More informationDigital Systems Design! Lecture 1  Introduction!!
ECE 3401! Digital Systems Design! Lecture 1  Introduction!! Course Basics Classes: Tu/Th 1112:15, ITE 127 Instructor Mohammad Tehranipoor Office hours: T 12pm, or upon appointments @ ITE 441 Email:
More informationFinal Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
More informationCryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice
Cryptography some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) modern secret key cryptography DES, AES public key cryptography RSA, digital signatures cryptography in practice
More information1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr JeanYves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
More informationELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B ecommerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
More informationGPU File System Encryption Kartik Kulkarni and Eugene Linkov
GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through
More informationDesign and Implementation of Lowarea and Lowpower AES Encryption Hardware Core
Design and Implemtation of Lowarea and Lowpower AES Encryption Hardware Core Panu Hämäläin, Timo Alho, arko Hännikäin, and Timo D Hämäläin Tampere University of Technology / Institute of Digital and
More informationLecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map nbit plaintext blocks to nbit ciphertext blocks (n = block length). For nbit plaintext and ciphertext blocks and a fixed key, the encryption
More information