Architectural Analysis of OpenSSL Crypto Algorithms for Network Processor

نویسنده

  • Piyush Ranjan Satapathy
چکیده

The wide spread adoption of the internet as a trusted medium of communication and commerce has made cryptography an essential component of modern information systems. So the performance of cryptographic communication applications on network processor has become an important topic of network processor system design. In this paper I compare and analyze the architectural characteristics of some wide spread cryptographic algorithms and their implementations through simulation on Simple Scalar, a MIPS like architecture. I have compared the instruction mix of the OpenSSL crypto algorithms with that of the SPEC95, CommBench and Average kind of algorithms. Also I have given a clear comparison of the average computational complexity per byte between the OpenSSL crypto algorithms and the others. Then considering 7 of these crypto algorithms (1 stream cipher type,3 block cipher type and 2 hash type) i have analyzed the impact of various cache sizes, different kind of branch predictions, different number of ALUs, and different Instruction fetch queue sizes. I find that memory system has a significant effect on overall performance. An ILP of 8,128 KB Instruction cache size and 32 KB Data cache size and direct mapping give better cryptographic operation for OpenSSL crypto algorithms. Cache replacement strategy doesn’t have an importance in overall performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of a Crypto Processor and Its Application to Security System

This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to th...

متن کامل

Securing OpenSSL against Micro-Architectural Attacks

This paper presents a version of the 2k-ary modular exponentiation algorithm that is secure against current methods of side-channel analysis that can be applied to PCs (the so-called micro-architectural attacks). Some optimisations to the basic algorithm are also proposed to improve the efficiency of an implementation. The proposed algorithm is compared to the current implementation of OpenSSL,...

متن کامل

Algorithm Design of Secure Data Message Transmission Based on Openssl and Vpn

In order to solve the safety problem that remote or mobile users can perform secure data transmission among different computers via enterprise internal network, conventional approach is to establish VPN connection. The transmitted data via VPN network must be encrypted so as to ensure that illegal users are unable to read them, therefore data security of VPN network depends entirely on the stre...

متن کامل

New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures

Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leakage of “side-channel” information. It has been realized that some components of modern computer microarchitectures leak certain side-channel information and can create unforeseen security risks. An example of such MicroArchitect...

متن کامل

Infrared Counter-Countermeasure Efficient Techniques using Neural Network, Fuzzy System and Kalman Filter

This paper presents design and implementation of three new Infrared Counter-Countermeasure (IRCCM) efficient methods using Neural Network (NN), Fuzzy System (FS), and Kalman Filter (KF). The proposed algorithms estimate tracking error or correction signal when jamming occurs. An experimental test setup is designed and implemented for performance evaluation of the proposed methods. The methods v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005