Integrated Cryptographic Network Interface Controller - PowerPoint PPT Presentation

About This Presentation
Title:

Integrated Cryptographic Network Interface Controller

Description:

This presentation will probably involve audience discussion, which will create ... In Slide Show, click on the right mouse button. Select 'Meeting Minder' ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 10
Provided by: vorlo
Learn more at: http://engr.case.edu
Category:

less

Transcript and Presenter's Notes

Title: Integrated Cryptographic Network Interface Controller


1
Integrated CryptographicNetwork Interface
Controller
  • This presentation will probably involve audience
    discussion, which will create action items. Use
    PowerPoint to keep track of these action items
    during your presentation
  • In Slide Show, click on the right mouse button
  • Select Meeting Minder
  • Select the Action Items tab
  • Type in action items as they come up
  • Click OK to dismiss this box
  • This will automatically create an Action Item
    slide at the end of your presentation with your
    points entered.
  • Glenn A. Emelko

2
Concept
  • Use standard LAN controller
  • Fully Ethernet Compatible
  • Integrated On-board Cryptography
  • Configurable Encryption Settings
  • Automatic Key Management
  • Built-in Entropy Generator
  • Auto-secure Connection Mode

3
Cryptography Wish List
  • High Speed
  • Large Volume Secure Transactions
  • Minimal Computational Requirements
  • Flexible
  • Wide range of settings depending on desired level
    of privacy and speed
  • Parameters (such as key size) have quantified
    effects on overall security

4
Cryptography Wish List (cont.)
  • Advances in computation, number theory, or
    quantum computing should not compromise security
  • P(M)P(MC), P(K)P(KC)
  • Suitable for use with many different
    cryptographic protocols
  • Publication of cryptographic method or protocol
    will not compromise security

5
Cryptographic Engine
  • FPGA Based Design
  • Variable Length Packets
  • Variable Length Key
  • Dynamic Configuration
  • High Speed / Throughput
  • Internal Entropy Generator
  • Key Negotiation Protocol

6
LAN Controller
  • Fully 10/100Base-T Compatable
  • One-chip Design
  • Drivers available for numerous operating systems

7
Architecture
  • On board CPLD or FPGA
  • PCI interface for PC Architecture
  • On board FIFO Buffer RAM
  • 10/100 Base-T interface (UTP Cat-5)

8
Research Topics
  • Dynamic Cryptographic Protocol
  • Fully Automatic Key Exchange
  • Entropy Generation
  • Alternatives to IPSEC
  • Competition of Existing Standards
  • Compatibility
  • Simplicity vs. Security

9
References
  • A. Beutelspacher (1991), Cryptology
  • N. Koblitz (1994), A Course on Number Theory and
    Cryptography
  • S. Levy (2001), Crypto
  • B. Schneier (1996), Applied Cryptography
  • S. Singh (1999), The Code Book
  • D. Welsh (1995), Codes and Cryptography
  • Numerous Internet Sources
Write a Comment
User Comments (0)
About PowerShow.com