MASON ECE 646 - Cryptographic Capabilities of Network Processors (9 pages)

Previewing pages 1, 2, 3 of 9 page document View the full content.
View Full Document

Cryptographic Capabilities of Network Processors



Previewing pages 1, 2, 3 of actual document.

View the full content.
View Full Document
View Full Document

Cryptographic Capabilities of Network Processors

101 views

Problems/Exams


Pages:
9
School:
George Mason University
Course:
Ece 646 - Cryptography and Computer Network Security
Cryptography and Computer Network Security Documents

Unformatted text preview:

1 Cryptographic Capabilities of Network Processors Aparna Kasturi Swethana Pagadala and Sheryl Pinto Abstract Network processors are programmable devices that process information packets at rates of 1 Gbit s and above Due to the sensitivity of information being exchanged over networks it is necessary for network processors to incorporate security measures over the data being transferred This report looks at the different schemes of adding cryptography to a network processor It also analyses two areas where network processors are used namely Storage Area Networks and wireless networks for the current cryptographic capabilities and standards used in these areas Securing of network traffic involves two main processes protocol processing and cryptographic algorithm processing Protocol processing includes the functions that are necessary for packet analysis and communication such as TCP Transmission Control Protocol IP Internet Protocol TLS Transmission Layer Security Cryptographic algorithm processing includes the algorithms that affect the entire payload in order to maintain confidentiality and integrity Index Terms Look Aside Architecture Polymorphic Ciphers WEP IPsec 1 INTRODUCTION 1 1 Security with Network Processors There are three main ways to add security to a network processor Look Aside Architecture The bandwidth boom and the drop in the cost of bandwidth opened the internet to a wide variety of applications such as ecommerce Voice over IP VoIP Virtual Private Networks etc Each application is associated with its own set of protocols and standards Networks need to have the equipment to be able to support these new protocols First is by means of a security co processor used in conjunction with a network processor Security co processor is cryptographic accelerator hardware that performs the encryption and decryption of data and also off loads the key exchanges from the main processor A diagram of the look aside architecture is shown below Earlier most networking



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Cryptographic Capabilities of Network Processors and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Cryptographic Capabilities of Network Processors and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?