研究生: |
盧風其 Feng-Chi Lu |
---|---|
論文名稱: |
高速率具可擴展性的 IPSec 處理器 High-Throughput Scalable Architecture of the IPSec Processor |
指導教授: |
黃稚存
Chih-Tsun Huang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2007 |
畢業學年度: | 96 |
語文別: | 英文 |
論文頁數: | 81 |
中文關鍵詞: | 網路協定安全 、效能 、可調整 、架構 |
外文關鍵詞: | IPSec, Throughput, scalable, architecture |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著在網際網路和無線通訊的應用的快速增長,在公共網路傳遞資訊的安全性已成為一個很基礎的課題。網際網路安全協定(IPSec)標準,是由IETF提供的在IP層的安全服務。以軟體的方式來實做IPSec已經不足以應付今日網路應用程式所產生龐大的網路流量。
在這篇論文中,我們提出一個可調整的IPSec架構。它提供了加密以及驗證的功能。在我們的設計中,密碼學的演算法提供了AES-ECB、AES-CBC、AES-CTR、AES-CCM、HMAC-MD5以及HMAC-SHA1。使用我們的IPSec硬體設計,我們提出的架構在一份硬體架構可以同時處理多個網路封包。為了大量的處理效能需求,這樣多個IPSec處理區塊的架構可以達到超過20 Gbps的處理效能。我們提出的架構是平台式的而且是可以調整的,我們提供了一個架構可以在資料處理量以及實作的代價中衡量得失以及取得平衡。
另外,一個在我們的架構中衡量整體效能的方式也在論文中提出,根據這個評估的模型,針對不同的網路安全需求,我們可以選擇適當的架構來實做。如果對於加密以及驗證的需求量是不相等的,這樣的評估模型可以提供不同的參數來最大化整體的效能。
With the rapid growth of applications in Internet and wireless communication, the security for transmitting nformation on public network has become a fundamental issue. The Internet Protocol Security (IPSec) standard is developed by the Internet Engineering Task Force (IETF) to provide the security services at the IP layer. IPSec implemented by software is not sufficient to handle the enormous traffic generated by modern network applications.
In this thesis, we propose the scalable architecture for IPSec. It provides encryption and authentication services. The cryptographic algorithms supported in our design are
AES-ECB, AES-CBC, AES-CTR, AES-CCM, HMAC-MD5 and HMAC-SHA-1. The proposed architecture can process multiple packets in parallel using our IPSec processing hardware. For high throughput requirement, the architecture of multi-IPSec processing block can achieve more than 20 Gbps throughput. The proposed architecture is platform based and scalable, which provides tradeoff between performance and cost for a wide range of network applications.
In addition, a performance evaluation method is provided for the proposed architecture. According to this evaluation model, we can choose the suitable architecture to implement for different requirements in network security. If the requirements of confidentiality and authentication are imbalance, the evaluation model can provide different parameters to maximize the overall throughput.
Bibliography
[1] R. Thayer R. Thayer and R. Glenn, IP Security Document Roadmap, IETF Network Working Group, 1998, RFC 2411.
[2] J. Postel, Intenet Protocol, DARPA Internet Program Protocol Specification, 1981, RFC 791.
[3] S. Deering and R. Hinden, Intenet Protocol, Version 6 (IPv6) Specification, IETF Network Working Group, 1988, RFC 2460.
[4] C.-Y. Hsieh, “A Scalable Architecture for IP security(IPSec) Hardware Accelerator”, Master Thesis, Dept. Electrical Engineering, National Tsing Hua University, Hsinchu, Taiwan, 2006.
[5] Broadcom Corporation, “BCM5840 Product Brief”, http://www.broadcom.com, 2004.
[6] Broadcom Corporation, “BCM5841 Product Brief”, http://www.broadcom.com, 2004.
[7] Broadcom Corporation, “BCM586X Product Brief”, http://www.broadcom.com, 2006.
[8] SafeNet Inc., “Safexcel-1842 Product Brief”, http://www.safenet-inc.com, 2005.
[9] Hifn Inc., “Hipp III Security Processor Product Brief”, http://www.hifn.com, 2003.
[10] S.-Y. Lin, “Design of a high-throughput low-power aes cipher for network applications”,
Master Thesis, Dept. Computer Science, National Tsing Hua University, Hsinchu, Taiwan,2006.79
[11] M.-Y. Wang, C.-P. Su, C.-T. Huang, and C.-W. Wu, “An HMAC processor with integrated SHA-1 and MD5 algorithms”, in Proc. Asia and South Pacific Design Automation
Conf. (ASP-DAC), Yokohama, Jan. 2004, pp. 456–458.
[12] S. Kent and R. Atkinson, IP Authentication Header, IETF Network Working Group, 1998, RFC 2402.
[13] S. Kent and R. Atkinson, IP Encapsulating Security Payload (ESP), IETF Network Working Group, 1998, RFC 2406.
[14] Inc. ARM Components, AMBA Specification Rev2.0, May 1999.
[15] ARM Components, Inc., Multi-Layer AHB, 2001.
[16] Chen-Hsing Wang, Chih-Yen Lo, Min-Shenq Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, and Shi-Yu Huang, “A Network Security Processor Design Based on an Integrated SOC Design and Test Platform”, in Proc. Design Automation Conference (DAC), 2006, pp. 490–495.
[17] R.Braden and D.Borman, “Computing the internet checksum”, RFC 1071, 1988.
[18] C. Madson and R. Glenn, “The use of HMAC-MD5-96 within ESP and AH”, RFC 2403, the Internet Society, Nov. 1998.
[19] C. Madson and R. Glenn, “The use of HMAC-SHA-1-96 within ESP and AH”, RFC 2404, the Internet Society, Nov. 1998.
[20] ACM SIGCOMM, “The internet traffic archive”, http://ita.ee.lbl.gov/index.html, 2000.
[21] M. Schneider D. Maughan, M. Schertler and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP), IETF Network Working Group, 1998, RFC 2408. 80
[22] D. Harkins and D. Carrel, The Internet Key Exchange (IKE), IETF Network Working Group, 1998, RFC 2409.
[23] H. Orman, The OAKLEY Key Determination Protocol, IETF Network Working Group, 1998, RFC 2412.