1 / 9

Integrated Cryptographic Network Interface Controller

This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab

shay
Télécharger la présentation

Integrated Cryptographic Network Interface Controller

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation • In Slide Show, click on the right mouse button • Select “Meeting Minder” • Select the “Action Items” tab • Type in action items as they come up • Click OK to dismiss this box • This will automatically create an Action Item slide at the end of your presentation with your points entered. Integrated CryptographicNetwork Interface Controller Glenn A. Emelko Glenn A. Emelko

  2. Concept • Use standard LAN controller • Fully Ethernet Compatible • Integrated On-board Cryptography • Configurable Encryption Settings • Automatic Key Management • Built-in Entropy Generator • Auto-secure Connection Mode Glenn A. Emelko

  3. Cryptography Wish List • High Speed • Large Volume Secure Transactions • Minimal Computational Requirements • Flexible • Wide range of settings depending on desired level of privacy and speed • Parameters (such as key size) have quantified effects on overall security Glenn A. Emelko

  4. Cryptography Wish List (cont.) • Advances in computation, number theory, or quantum computing should not compromise security • P(M)=P(M|C), P(K)=P(K|C) • Suitable for use with many different cryptographic protocols • Publication of cryptographic method or protocol will not compromise security Glenn A. Emelko

  5. Cryptographic Engine • FPGA Based Design • Variable Length Packets • Variable Length Key • Dynamic Configuration • High Speed / Throughput • Internal Entropy Generator • Key Negotiation Protocol Glenn A. Emelko

  6. LAN Controller • Fully 10/100Base-T Compatable • One-chip Design • Drivers available for numerous operating systems Glenn A. Emelko

  7. Architecture • On board CPLD or FPGA • PCI interface for PC Architecture • On board FIFO Buffer RAM • 10/100 Base-T interface (UTP Cat-5) Glenn A. Emelko

  8. Research Topics • Dynamic Cryptographic Protocol • Fully Automatic Key Exchange • Entropy Generation • Alternatives to IPSEC • Competition of Existing Standards • Compatibility • Simplicity vs. Security Glenn A. Emelko

  9. References • A. Beutelspacher (1991), Cryptology • N. Koblitz (1994), A Course on Number Theory and Cryptography • S. Levy (2001), Crypto • B. Schneier (1996), Applied Cryptography • S. Singh (1999), The Code Book • D. Welsh (1995), Codes and Cryptography • Numerous Internet Sources Glenn A. Emelko

More Related