time based encryption on network processor team wolfdale the university of southern california 1

15
TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Upload: anis-tyler

Post on 18-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

1

TIME BASED ENCRYPTION ON NETWORK PROCESSOR

TEAM WOLFDALEThe University of Southern California

Page 2: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Instructor: Dr. Young Cho

Mentor : Siddharth Bhargav

Team Members

Praveen Francis

Gaurav Yadav

Samitsubhro Banerji

Kaushik Raju

Team Wolfdale Members

2

Page 3: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

A Time Based Content Encryption Algorithm Based

On a Specific Sender-Receiver IP Pairs.

The Project

3

Page 4: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Encryption at software level is slow as compared to hardware level

Most encryption algorithms use static keys.

HERE we Use a DYNAMIC KEY

The problems

4

Page 5: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Router on NetFPGA

SENDER/RECEIVER IP NO MATCH

The General Concept

Router on NetFPGA

Data

Data

10.0.1.3 / 12.0.1.310.0.1.3 / 12.0.2.3

10.0.1.3

10.0.2.3 12.0.2.3

12.0.1.3

5

Page 6: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Router on NetFPGA

SENDER/RECEIVER IP MATCHEncrypting…

The General Concept

Router on NetFPGA

Encrypted Data

Data

SENDER/RECEIVER IP MATCHDecrypting…

Data

10.0.1.3 / 12.0.1.310.0.1.3 / 12.0.2.3

10.0.1.3

10.0.2.3 12.0.2.3

12.0.1.3

6

Page 7: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

System Flow Chart

IP Matcher

PayloadProcessor 1

Timestamp

Source

Destination

Processor 2

Yes

Encrypt/Decrypt

Unmodified Packet

Modified Packet

No

Packet

7

Page 8: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Multi-threading with branch

8

LUT4Rs_data(0)Rs_data(1)

BNSBS

BNS = Branch if not setBS = Branch if set

MU

X

Reg File32*8B

ID StageIF Stage

PC

PC

PC

PC

Mod4 Counter

Instruction Memory

4K

Control Unit

10

100

200

300

01

ADD

Rs_data(31:0)

Rt_data(31:0)

BNSBS

Rt_data(11:0)

1

Branch

50

Taken

101

Page 9: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

IP Matcher

Memory Bank 0

Memory Bank 1

64-bit 64-bit

64-bit 64-bit

4 Unit Comparator Block

Payload

Timestamp

Source

Destination

Packet

Processor and

Timestamp Register

Match

Data Out a

Data Out b

Data Out a

Data Out b

Data In

64 bit IP

64 bit IP

NoMatch

If Found

Else

9

Page 10: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

ENCRYPTER/DECRYPTER

10

Timestamp Reg

Table of Keys

ENCRYPT

DECRYPT

EN1

EN2

DATA_IN

DATA_IN

Timestamp from Header

DATA_OUT

DATA_OUT

Page 11: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

IN F

IFO

Arbi

ter

IP Matcher

Encrypt / Decrypt

OU

TPU

T Q

UEU

ES

IP Matcher

Encrypt / Decrypt

PF

PF1

PF

PF2PF3PF4PF5PF6PF7PF8

PF

PF1PF2PF3PF4PF5PF6PF7PF8

MATCH!!

PF5PF4

MAC IDs

PF4PF5

NO MATCH!!

DONE!!

Multi-core ImplementationCalculatingchecksum..

11

MAC IDs

ComparingMAC ID..Encrypt

data!

Page 12: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Future Scope Of Work

Use of sophisticated encryption/decryption techniques.

Implementation of bloom filter for ip matcher

Two dummy threads to be used for additional network functionalities.

12

Page 13: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

Evaluation of Project

Evaluation Methods Secure transmission of data in

between nodes Throughput measurement

Project Results evaluation logic functionality Check Bug Analysis Rectify Design Compare With The Software

Emulation Results

13

Page 14: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

PROGRESS REPORT

Phase Description Date

Single Core Processor with Multi Threading

04/23/2013

Hardware Accelerators Design Simulation

Multi Core Processor with Multithreading

Hardware Accelerators Individual Implementation

Integration of Hardware Accelerators with Multicore

Processors

Evaluation of the System

Status

04/23/2013

05/07/2013

04/30/2013

05/02/2013

05/10/2013

Completed

Completed

Pending

In Progress

In Progress

Pending14

Page 15: TIME BASED ENCRYPTION ON NETWORK PROCESSOR TEAM WOLFDALE The University of Southern California 1

15