Hardware Implementation of a Secure Bridge in Ethernet Environments
نویسندگان
چکیده
In this paper we present a solution providing secure communications over an extended Ethernet LAN. This solution, proposed by the Applied Mathematics and Telematics Department of the Polytechnic University of Catalonia, is based on a set of secure bridges, called CryptoNets, and a Supervision and Administration Center (SAC), which takes charge of the remote management of the work of these devices. A first version of the physical and functional architecture of these secure bridges was presented in [1], [2], [3]. Here we will describe a modification of the initial architecture, in order to improve substantially its performance, both the typical functions of a classical bridge (filtering frame speed) and the specific functions of ciphering. Furthermore, it allows us to build more integrated equipment, with larger number of functions and at a lower cost.
منابع مشابه
Threshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملA Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملVlsi Implementation of Internet Checksum Calculation for 10 Gigabit Ethernet
Computer networks are limited in performance by the electronic equipment. Terminals have received little attention, but need to be redesigned in order to be able to manage 10 Gigabit Ethernet. The Internet checksum computation, which is used in TCP and UDP requires specialized processing resources. The TUCFP hardware accelerator calculates the Internet checksum. It processes 32 bits in parallel...
متن کاملA secure address resolution protocol
We propose an architecture for securely resolving IP addresses into hardware addresses over an Ethernet. The proposed architecture consists of a secure server connected to the Ethernet and two protocols: an invite-accept protocol and a request-reply protocol. Each computer connected to the Ethernet can use the invite-accept protocol to periodically record its IP address and its hardware address...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1993