High Performance Storage Encryption on Intel(R) Architecture Processors White Paper
نویسندگان
چکیده
There is a critical need for securing data-at-rest in enterprise storage devices at very high data rates. The IEEE has drafted the P1619 standard to support encryption of data-at-rest for block-based devices. This paper describes the performance characteristics of an optimized implementation of storage encryption, benefiting from the AES-NI set of instructions on Intel ® processors based on the 32-nm microarchitecture. This paper describes the performance characteristics of an optimized implementation of Storage encryption as defined in the IEEE P1619 Standard. In terms of throughput, we are able to perform AES128 Encryption in the XTS mode at the aggregate rate of ~18 Gigabits/sec for large buffers, on a single core of an Intel ® Core™ i5 650 processor, with Intel ® Hyper-Threading Technology. For enterprise storage, more of the market is rapidly moving from unencrypted to fully encrypted storage over time. Storage appliances need to support line-rates of the order of ~50 Gigabits/second and will eventually require encryption at these rates, assuming all data is stored encrypted. We see that Intel ® processors supporting the AES-NI set of instructions can comfortably satisfy the peak performance requirement with just three cores. The Intel ® Embedded Design Center provides qualified developers with web-based access to technical resources. Access Intel Confidential design materials, step-by step guidance, application reference solutions, training, Intel " s tool loaner program, and connect with an e-help desk and the embedded community. Design Fast. Design Smart. Get started today. Overview The need for storage encryption is rapidly increasing with incidents of data loss containing sensitive personal or financial information related to medical records, credit-card/social-security numbers etc. Regulations are being put in place that mandate encryption for all sensitive information. Other regulations on companies are increasing, requiring them to preserve all records of transactions securely for extended periods of time, with strict penalties for violations. There is thus a critical need for securing data-at-rest in storage devices at very high data rates. The IEEE has drafted the P1619 standard [1] to support encryption of data-at-rest for block-based devices. Encryption is performed by the AES block cipher in a mode of operation called XTS. AES-XTS performance can be significantly increased by using the AES set of instructions in Intel ® processors based on the 32-nm micro-architecture. For simplicity we have described the encryption in this paper, however the decryption approach and performance are almost identical.
منابع مشابه
Optimized Galois-Counter-Mode Implementation on Intel® Architecture Processors
Executive Summary Galois-Counter-Mode (GCM) is a block cipher mode of operation that uses universal hashing over a binary Galois field to provide authenticated encryption. Galois Hash is used for authentication, and the Advanced Encryption Standard (AES) block cipher is used for encryption in counter mode of operation. This paper describes an optimized implementation of GCM benefiting from the ...
متن کاملFast Cryptographic Computation on Intel(R) Architecture Processors via Function Stitching
Cryptographic applications often run more than one independent algorithm such as encryption and authentication. This fact provides a high level of parallelism which can be exploited by software and converted into instruction level parallelism to improve overall performance on modern super-scalar processors. We present fast and efficient methods of computing such pairs of functions on IA process...
متن کامل330343-002_High Performance ZLIB Compression on Intel® Architecture Processors White Paper
The need for lossless data compression has grown significantly as the amount of data collected, transmitted, and stored has exploded in recent years. Enterprise applications and storage, such as web servers and databases, are processing this data and the computational burden associated with compression puts a strain on resources. To help alleviate the burden, we introduce an optimized industry ...
متن کاملChoosing a CRC polynomial and associated method for Fast CRC Computation on Intel® Processors white paper
Cyclic Redundancy Check (CRC) codes are widely used for integrity checking of data in fields such as storage and networking. Fast and efficient methods of computing CRC on Intel® processors have been proposed for the fixed (degree-32) iSCSI polynomial, using the CRC32 instruction introduced in the Intel® Core™ i7 Processors. In addition, the PCLMULQDQ instruction can be used for fast CRC comput...
متن کاملStorage Protection with Intel® Anti-Theft Technology - Data Protection (Intel® AT-d)
Data-at-rest (DAR) encryption, embedded in peripheral controller hardware, combines the security, reliability, and performance benefits of storage device encryption, but it doesn’t impact the enterprise services necessary for low-cost operation and worker productivity. This kind of encryption is highly adaptable to the needs of new-use models that cache data in high-speed flash memory or that s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010