透過您的圖書館登入
IP:3.14.15.94
  • 學位論文

密碼演算法與網路安全協定之可擴充性架構

Scalable Architectures for Cryptographic Algorithms and Network Security Protocols

指導教授 : 吳誠文

摘要


網路技術的發展促使網路應用的大量成長,也使得高效能網路封包處理的需求持續地增加。高階網路設備通常用來解決這樣的網路問題。如果網路設備也要處理機密的電子商務資料或影音服務資料,它一定要提供安全處理功能,例如加密與解密。這意指每一個網路設備需要一個或多個能夠有效地處理密碼演算法與網路安全協定功能的安全處理器。針對產品的開發而言,知道如何使用一個創意且有效的方式去設計這樣的前瞻密碼處理器和如何符合成本效益地整合多個處理器在單一晶片都是重要的。針對如何在合理成本考量下去解決效能的問題,此篇論文提出數個前瞻安全處理器和相關的擴充性架構,也包含其中設計細節。整篇論文可分成三個部份來探討。第一部份提出可用來檢查資料完整性及驗證的雜湊演算法處理器和雜湊式訊息驗證碼處理器。此部份包含一個整合了安全雜湊演算法1和訊息摘要5演算法的雜湊演算法處理器核心。這個核心可以使用於低成本應用也能用於高效能的應用。在這個核心裡面,我們使用一個移位暫存器方法,在兩個雜湊演算法裡的字組擴展步驟能夠以較低硬體成本的方式實現。相比其他設計,我們的混合式雜湊處理器核心有類似的效能但有較低的硬體成本。為了能夠應用於高速網路系統,我們也設計一個管線的雜湊演算法處理器核心。這個核心已經被整合到一個網際網路安全協定處理器上。以非管線式的雜湊處理器核心為基礎,我們也設計一個雜湊式訊息驗證碼處理器去處理在網路安全協定中需要的訊息驗證工作。這個處理器支援字組填補自動化和能夠針對連續使用相同金鑰的處理作金鑰排程(消除金鑰計算時間)。第二部份提出具有多個可組態參數的前瞻加密標準核心的密碼架構。這個多核心架構能夠達到高效能與增強安全性。這個架構減少主處理器的中斷處理負擔也使用共同的控制介面去簡化此架構的管理。相比於傳統的方法,此架構有較好的效能與等效邏輯閘數目比率。除此之外,此架構包含四個安全屬性,相比於其他架構,它有較高的安全性。在最後的部份,我們描述一個網狀結構的網際網路安全協定處理器。這個內含數十個前瞻加密標準核心和雜湊演算法核心的處理器能夠同時處理七十二個網路封包。它提供一個通用的結構去處理不同網路安全協定與密碼演算法組合的運算。它也利用多重平行方式去增強其效能。除此之外,瓦片狀的相互連結架構也用來解決匯流排引起的握手與競爭問題。在此架構中,我們設計網路安全協定特定的低延遲繞送硬體。相比於四種用於網路單晶片的路由器,它有較低的等效邏輯閘數目。除此之外,相較於先前的方法,這個網路安全協定處理器有較高的效能與等效邏輯閘數目比率。規則的結構能提供高的擴充性,因此,連接多個網路安全協定處理器能夠進一步提升處理效能。另外,我們也發展一個自動程序用來減少設計驗證的複雜度。

並列摘要


Advances in network technology stimulate an enormous growth in the number of applications. These also lead to a growing demand for handling a considerable number of packets over the Internet. High-end network equipment is usually used to confront the traffic problem. If the equipment is required to deal with sensitive network traffic from electronic commerce or secure audio/video services, it must be equipped with security processing functions. This means that one or more powerful security processors for cryptographic algorithms and network security protocols are needed in the network equipment. For product development, it is important to know how to design such an advanced cryptographic processor in an innovative and efficient way, and how to integrate multiple processors into a single chip cost-effectively. This thesis describes design details for advanced security processors and scalable architectures which tackle the performance problem at reasonable cost. The details are divided into three major parts. The first part presents hash and HMAC processors, which are used for purposes of data integrity and authentication. In this part, a novel hash processor core with integrated SHA-1 and MD5 algorithms is proposed for cost-oriented and performance-oriented applications. Based on a shift-register approach, word expansion steps for both MD5 and SHA-1 can be performed at lower cost. The hybrid hash core has a similar performance with a lower hardware cost in comparison with existing designs. A pipeline version is also developed for high-speed network systems and has been integrated into an IPsec processor. Based on the non-pipelined hash processor core, we also design an HMAC processor for message authentication required by network security protocols such as IPsec and SSL/TLS. The HMAC design has automatic word padding and supports key scheduling for successive HMAC tasks using the same key (removing key computation time). The second part is the design of a multi-core configurable crypto architecture including several configurable AES processor cores which implement AES algorithm and extended AES version. Each configurable AES processor core, providing such a flexibility to configure parameters defined in the AES algorithm, is used to reinforce the security in data communication. With the multi-core configurable AES architecture, both high encryption throughput and enhancing security level are achieved. In the architecture, a linked-list data structure is exploited to reduce the interrupt handling load of the host processor. Also, the management of the architecture is simplified by a shared control interface. For 128-bit AES in the CBC mode, the architecture obtains better Gbps/Kgates ratio than conventional methods. The proposed architecture with four security properties leads to higher security than other AES architectures. The final part describes the design of a mesh-structured IPsec processor, which plays an important role in dealing with complex cryptographic operations of IP security protocol suite. The proposed IPsec processor, consisting of dozens of AES and hash cores, can handle at most 72 IP packets simultaneously. It provides a general scheme that handles IPsec crypto functions, including a combination of protocols and algorithms. It also employs multi-level parallelism to enhance performance. Besides, a tile and interconnection architecture is designed to solve both handshake and contention issues induced by bus architectures. In the architecture, the low-latency IPsec-specific routing hardware has lower gate count than four kinds of routers used in NoCs (Networks-on-Chips). Also, the IPsec processor has higher Mbps/Kgates ratio than previous work. Regular structure provides high scalability, so multiple IPsec processors can be connected directly to raise the performance. An automated procedure is also developed to reduce the verification effort.

參考文獻


[1] Semiconductor Industry Association, “International technology roadmap for semiconductors (ITRS), 2007 edition”, Dec. 2007.
[3] N. R. Potlapally, S. Ravi, A. Raghunathan, R. B. Lee, and N. K. Jha, “Configuration and extension of embedded processors to optimize IPSec protocol execution”, IEEE Trans. on VLSI Systems, vol. 15, no. 5, pp. 605–609, May 2007.
[4] J. Thoguluva, A. Raghunathan, and S. T. Chakradhar, “Efficient software architecture for IPSec acceleration using a programmable security processor”, in Proc. Conf. Design, Automation, and Test in Europe (DATE), Munich, Mar. 2008, pp. 1148–1153.
[5] R. Friend, “Making the gigabit IPsec VPN architecture secure”, Computer, vol. 37, no. 6, pp. 54–60, June 2004.
[6] W. J. Dally and B. Towles, “Route packets, not wires: On-chip interconnection networks”, in Proc. IEEE/ACM Design Automation Conf. (DAC), Las Vegas, June 2001, pp. 684–689.

被引用紀錄


魏宣如(2013)。安寧緩和療護之臨終關懷社會工作方法在地化初探-以天主教台東聖母醫院為例〔碩士論文,長榮大學〕。華藝線上圖書館。https://doi.org/10.6833/CJCU.2013.00073
吳梓卉(2012)。高齡者臨終意象之探討〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2012.00009

延伸閱讀