integrated cryptographic network interface controller n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Integrated Cryptographic Network Interface Controller PowerPoint Presentation
Download Presentation
Integrated Cryptographic Network Interface Controller

Loading in 2 Seconds...

  share
play fullscreen
1 / 9
shay

Integrated Cryptographic Network Interface Controller - PowerPoint PPT Presentation

101 Views
Download Presentation
Integrated Cryptographic Network Interface Controller
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation • In Slide Show, click on the right mouse button • Select “Meeting Minder” • Select the “Action Items” tab • Type in action items as they come up • Click OK to dismiss this box • This will automatically create an Action Item slide at the end of your presentation with your points entered. Integrated CryptographicNetwork Interface Controller Glenn A. Emelko Glenn A. Emelko

  2. Concept • Use standard LAN controller • Fully Ethernet Compatible • Integrated On-board Cryptography • Configurable Encryption Settings • Automatic Key Management • Built-in Entropy Generator • Auto-secure Connection Mode Glenn A. Emelko

  3. Cryptography Wish List • High Speed • Large Volume Secure Transactions • Minimal Computational Requirements • Flexible • Wide range of settings depending on desired level of privacy and speed • Parameters (such as key size) have quantified effects on overall security Glenn A. Emelko

  4. Cryptography Wish List (cont.) • Advances in computation, number theory, or quantum computing should not compromise security • P(M)=P(M|C), P(K)=P(K|C) • Suitable for use with many different cryptographic protocols • Publication of cryptographic method or protocol will not compromise security Glenn A. Emelko

  5. Cryptographic Engine • FPGA Based Design • Variable Length Packets • Variable Length Key • Dynamic Configuration • High Speed / Throughput • Internal Entropy Generator • Key Negotiation Protocol Glenn A. Emelko

  6. LAN Controller • Fully 10/100Base-T Compatable • One-chip Design • Drivers available for numerous operating systems Glenn A. Emelko

  7. Architecture • On board CPLD or FPGA • PCI interface for PC Architecture • On board FIFO Buffer RAM • 10/100 Base-T interface (UTP Cat-5) Glenn A. Emelko

  8. Research Topics • Dynamic Cryptographic Protocol • Fully Automatic Key Exchange • Entropy Generation • Alternatives to IPSEC • Competition of Existing Standards • Compatibility • Simplicity vs. Security Glenn A. Emelko

  9. References • A. Beutelspacher (1991), Cryptology • N. Koblitz (1994), A Course on Number Theory and Cryptography • S. Levy (2001), Crypto • B. Schneier (1996), Applied Cryptography • S. Singh (1999), The Code Book • D. Welsh (1995), Codes and Cryptography • Numerous Internet Sources Glenn A. Emelko