Document

advertisement
TIME BASED ENCRYPTION ON
NETWORK PROCESSOR
TEAM WOLFDALE
The University of Southern California
1
Team Wolfdale Members
Instructor: Dr. Young Cho
Mentor : Siddharth Bhargav
Team Members
Praveen Francis
Gaurav Yadav
Samitsubhro Banerji
Kaushik Raju
2
The Project
A Time Based Content Encryption
Algorithm Based On a Specific
Sender-Receiver IP Pairs.
3
The problems
Encryption at software
level is slow as compared to
hardware level
Most encryption algorithms
use static keys.
HERE we Use a DYNAMIC KEY
4
The General Concept
12.0.1.3
Data
10.0.1.3
SENDER/RECEIVER IP
NO MATCH
Data
10.0.1.3 / 12.0.1.3
10.0.1.3 / 12.0.2.3
10.0.2.3
12.0.2.3
5
The General Concept
12.0.1.3
Data
10.0.1.3
SENDER/RECEIVER IP
Encrypting…
MATCH
SENDER/RECEIVER IP
Decrypting…
MATCH
Encrypted
Data
Data
10.0.1.3 / 12.0.1.3
10.0.1.3 / 12.0.2.3
10.0.2.3
12.0.2.3
6
System Flow Chart
No
Packet
IP Matcher
Unmodified
Packet
Yes
Source
Destination
Timestamp
Processor 1
Payload
Encrypt/
Decrypt
Processor 2
Modified
Packet
7
Multi-threading with branch
ID Stage
MUX
IF Stage
1
PC
PC
PC
PC
0
ADD
Control
Unit
Instruction
Memory Branch
4K
200
300
BS
BNS
BS
BNS
Rs_data(31:0)
Reg File
32*8B
10
Taken
LUT4
101
1
100
Mod4
Counter
Rt_data(11:0)
Rs_data(1)
Rs_data(0)
Rt_data(31:0)
50
BS = Branch if set
BNS = Branch if not set
8
IP Matcher
4 Unit Comparator Block
64 bit
IP
Packet
64-bit
64-bit
If Found
Else
64-bit
64-bit
Processor
and
Timestamp
Register
Source
Destination
Timestamp
Data
Out a
Payload
No
Match
Match
Data
In
Data
Out a
Memory
Bank 1
Memory
Bank 0
Data
Out b
Data
Out b
9
ENCRYPTER/DECRYPTER
Timestamp from
Header
EN1
DATA_IN
Timestamp Reg
EN2
Table of Keys
DATA_IN
E
N
C
R
Y
P
T
D
E
C
R
Y
P
T
DATA_OUT
DATA_OUT
10
Multi-core Implementation
MATCH!!
DONE!!
IP
Matcher
Encrypt /
Decrypt
IP
Matcher
Encrypt /
Decrypt
NO
MATCH!!
PF1
PF2
PF3
PF4
PF5
PF6
PF7
PF8
MAC
IDs
OUTPUT QUEUES
Arbiter
IN FIFO
PF
PF1
PF2
PF3
PF4
PF5
PF6
PF7
PF8
Calculating
Comparing
Encrypt
MAC
checksum..
MAC
data!
ID..
IDs
11
Future Scope Of Work
 Use of sophisticated
encryption/decryption
techniques.
 Implementation of bloom
filter for ip matcher
 Two dummy threads to be
used for additional
network functionalities.
12
Evaluation of Project
 Evaluation Methods
 Secure transmission of data in
between nodes
 Throughput measurement
 Project Results evaluation




logic functionality Check
Bug Analysis
Rectify Design
Compare With The Software
Emulation Results
13
PROGRESS REPORT
Phase
Description
Date
Status
Single Core Processor
with Multi Threading
04/23/2013
Completed
Hardware Accelerators
Design Simulation
04/23/2013
Completed
Multi Core Processor
with Multithreading
04/30/2013
In Progress
Hardware Accelerators
Individual Implementation
05/02/2013
In Progress
Integration of Hardware
Accelerators with Multicore
Processors
05/07/2013
Pending
05/10/2013
Pending
Evaluation of the
System
14
15
Download