DOC PREVIEW
MASON ECE 646 - CRYPTOGRAPHIC CAPABILITIES OF NETWORK PROCESSORS

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Sample Chapter from Implementing and Managing Security for NCRYPTOGRAPHIC CAPABILITIES OF NETWORK PROCESSORS Ganesh Maddipati Tarun Nallabelli Uma Koppula Usman Akhtar Network Processor is a programmable microprocessor optimized for processing network data packets. Software programmability is an important characteristic of network processors, because it provides flexibility across a range of applications. A Network processor functions as high performing networking equipment in terms of packet processing rate and security. A Security Co-processor is used in conjunction with a Network Processor to provide security over the network. We can have various configurations of a Network processor and Security Processor. The security implementations of the Network processor also include the security protocols like IPSec (Internet Protocol Security) and SSL (Secure Socket Layers) which are implemented in Virtual Private Network (VPN) and Client/Server Communication respectively. The Security implementations in Network Processors can be considered as being Hardware oriented with Security Co-processors and Software Oriented with the use of security protocols. Our Objective: To study the security implementations of Network processors using Security Co-processors, the various configurations of the security co-processor in conjunction with the Network processor, and also to deal with the Security protocols implemented in the Network processor in depth. We will be covering the following aspects given below during our project work. Plan of Study 1. Study of Network Processors • Existing Architectures • Security implementations: With regard to the Hardware and Software. • Programmability • Future Network Processors2. Study of Security Co-Processors • General architectures • Algorithms that are being implemented • Configuration in conjunction with a Network processor • Comparison of Co-processors chips by Intel, Cavium, Safenet, Hifn • Future Coprocessors 3. Study of the standardized security Protocols: IPSec and SSL Based on Formats and Algorithms used by three main protocols IPSec: • Authentication Header (AH) • Encapsulating Security Payload (ESP) • Internet key exchange (IKE) SSL : • Handshake • Record • Alert Their application in VPNS and worldwide web for client server communication THE QUESTIONS WE ARE SEEKING ANSWERS TO ? How does a Network Processor provide high performance in terms of speed and security? ? How is the Network processor used for security implementations? ? How can we configure a Security processor in conjunction with a network processor? ? How can the encryption and decryption be implemented on hardware? ? How can the IPSEC and SSL protocols be implemented on the network processors? ? How can software implementations be used for network processors without compromising with the speed of implementations?Table of Contents 1. Introduction to Network Processors 2. Security Implementations in Network Processors 3. Working of Security Co-processor & Network Processor as a team. 4. The Security Protocols 5. IPSec and the Virtual Private Network 6. SSL and the Client/Server Communication 7. A Final Word on Network Processors and its Security Capabilities 8. Bibliography Progress Report Oct 13 – Study of existing Network processor architectures of four leading vendors Security implementations (Hardware and Software), Programmability and possible developments of Network Processors Submission of First Progress Report Nov 3- General architecture of Security Co-Processors and the algorithms that are Implemented on them. Security Co-processor in conjunction with a Network processor, (Comparing four vendor’s Configurations) Submission of Second Progress Report Nov 17- Comparison of IPSec and SSL based on their protocols. Submission of Third Progress Report Dec 1- IPSec and SSL implementations in VPN and Client/Server Communication. Submission of Final Progress Report Dec 11- Complete Project Report submission by email Dec 13 – Submission of reviews on projects Dec 15 – Final oral presentation & submission of final written reportsReferences: Books: • IP security chapter from Cryptography and network security : principles and practice / William Stallings. • Security CoProcessors chapter from Network processors : architectures, protocols, and platforms / Panos C. Lekkas • IPSec : the new security standard for the Internet, intranets, and virtual private networks / Naganand Doraswamy, Dan Harkins. • Chapters 16 and 17 from Network processor design : issues and practices / edited by Patrick Crowley • Cryptography and Network Security :Principles and Practices by William Stallings. Articles: • Article from Netrino on Introduction to Network Processors by Mark Kohler http://www.netrino.com/Articles/NetworkProcessors/• Article from Intel about adding security via network processors http://www.intel.com/technology/itj/2002/volume06issue03/art02_security/p03_secarchitecture.htm • Sample Chapter from Implementing and Managing Security for Network Communications ,By Bill Ferguson, Diane Barrett, Don Poulton provided courtesy of Que. http://www.informit.com/articles/article.asp?p=174362 • Article By Sun Microsystems provided courtesy of Prentice Hall PTR. http://www.informit.com/articles/article.asp?p=330804 • Networking techniques information provided by IBM IP Security (IPSec) protocols • http://www.networkmagazineindia.com/200107/process1.htm


View Full Document

MASON ECE 646 - CRYPTOGRAPHIC CAPABILITIES OF NETWORK PROCESSORS

Documents in this Course
Load more
Download CRYPTOGRAPHIC CAPABILITIES OF NETWORK PROCESSORS
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CRYPTOGRAPHIC CAPABILITIES OF NETWORK PROCESSORS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CRYPTOGRAPHIC CAPABILITIES OF NETWORK PROCESSORS 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?