| 研究生: |
賈證主 Chia, Chung-Chu |
|---|---|
| 論文名稱: |
為著現代資訊安全協定具有隨機組態設定與管線排程之多元加密系統 Randomly Configured and Pipeline Scheduled Multi-Cipher Cryptosystem for Modern Secure Protocols |
| 指導教授: |
楊中平
Young, Chung-Ping |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2012 |
| 畢業學年度: | 100 |
| 語文別: | 英文 |
| 論文頁數: | 97 |
| 中文關鍵詞: | 資訊安全協定 、多元加密 、硬體排程 、單晶網路 |
| 外文關鍵詞: | Secure protocols, Multi-cipher, Hardware scheduling, Network on a Chip |
| 相關次數: | 點閱:77 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文主旨在探討如何建構一種具有同時處理多種加密演算法及其加密組態的多核心系統,它可以在每個通訊階段前進行隨機組態設定及多核心加密系統的工作排程,以有效降低現代資訊安全協定中,單一一種演算法及其加密模式以及單一一把金鑰的使用時間,並且提高整個加密系統的資料產出量。隨機組態設定可以有效隱藏每次通訊之中多核心加密系統的組態,系統根據這個組態,在實際進行通訊之前會進行一次多核心處理器的工作排程設計,以獲得最大產出。這個多元加密系統可以在一個通訊階段使用許多的加密核心,每個加密核心能夠使用不同的私密金鑰來獨立執行一種演算法及其工作模式。加密核心可以是一個加密專用的硬體或者是使用微處理器來實現。除此之外,隨機組態設定的結果可能需要大量的加密核心來達到系統最大產出量。因此,傳統匯流排已經無法提供足夠的頻寬來滿足高產出的需求,再加上處理器海的設計容易受到時脈訊號偏移而不穩定。因此,本論文還建構了一個晶片網路模擬平台來解決多核心系統規模增加時的設計問題,這個平台源自於蜘蛛網拓撲,它的架構具有很好的延展性,根據這個單晶網路拓撲,每個晶片中的節點數量是可以做彈性調整的,若要進行系統擴充,也可以很容易的將數個晶片連接起來,以滿足不同組態所需要的核心數量。因此,在現代資訊安全協定中,本論文所提出的多元加密系統不僅可行而且是值得推廣的。
To shorten the exposure time of a specific cipher algorithm as a communication session has been sustained for long, the employment of automatic switch between multiple cipher algorithms per session basis is proposed. In addition, to hide the scheduling sequence and upgrade the throughput, random configuration and pipelined scheduling for diverse encryption bursts are proposed. Furthermore, when the proposed cryptosystem requires a large number of cipher cores, a simplified and extensible spidegon network-on-chip (NoC) platform is built and simulated to provide enough bandwidth and resolve clock skew problems for sea-of-processor implementations.
It is obvious that merely employing a single cipher algorithm with a specific mode of operation and a single session key per session basis in nowadays secure protocols may ease a continuous tracking of a specific cipher algorithm over a communication session. Therefore, a piece of broken information leads to the decipherment of whole session information. Due to frequent switch between diverse cipher suits in the proposed cryptosystem, each encryption burst is short and independent. Even if a short burst is broken, the impact to the whole session information may be still negligible. Consequently, the proposed cryptosystem is worthy to be promoted for modern secure protocols.
[1] The official IPsec Howto for Linux, http://www.ipsec-howto.org/.
[2] Openssl Project, http://www.openssl.org/.
[3] An overviews of cryptography, http://www.garykessler.net/library/crypto.html.
[4] T. Wollinger, J. Guajardo, and C. Paar,"Cryptography on FPGAs: State of the Art Implementations and Attacks," ACM Special Issue Security and Embedded Systems, Volume 3, Issue 3, August 2004.
[5] S. D. Brown, “Field-Programmable Gate Arrays,” Kluwer Academic Publishers, 1992.
[6] P.K. Chan and M.D.F. Schlag, “Architectural tradeoffs in field-programmable-device-basedcomputing systems,”, Proceedings. IEEE Workshop on FPGAs for Custom Computing Machines, pp. 152-161,1993.
[7] Volatile FPGA design security - a survey, http://www.cl.cam.ac.uk/~sd410.
[8] S. Dimmer, "Security for volatile FPGAs," http://www.cl.cam.ac.uk/.
[9] L. C. Caruso, G. Guindani, H. Schmitt, N. Calazans, and F. Moraes, "SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems," 18th IEEE/IFIP International Workshop on Rapid System Prototyping (RSP '07), pp.27-33, 2007.
[10] NoCS, www.nocsymposium.org/.
[11] L. Benini and G. D. Micheli, "Networks on Chips: A New SoC Paradigm," IEEE Computer, vol. 35, pp.70-78, Jan. 2002.
[12] W. J. Dally, and B. Towles, "Route packets, not wires: on-chip interconnection networks," in Proceedings of the Design Automation Conference (DAC), pp.684-689, Las Vegas, NV, June 2001.
[13] K. Yoshigoe and K. J. Christensen,"A Parallel-Polled Virtual Output Queued Switch with a Buffered Crossbar," IEEE HPSR, pp.271-275, May. 2001.
[14] A. Mello, L. Moller, N., and Calazans, F. Moraes,"MultiNoC: A Multiprocessing System Enabled by a Network on Chip," IEEE DATE, pp.234-239, Mar. 2005.
[15] A. Jerraya, H. Tenhunen, and W. Wolf, "Multiprocessor System-on-chips. IEEE Computer magazine," Vol. 38, No. 7, July 2005.
[16] C. P. Young, C. C. Chia, Y. B. Lin, an L. B. Chen,"Fast multi-cipher transformation and its implementation for modern secure protocols," International Journal of Innovative Computing, Information and Control, Vol. 7, No. 8, pp. 4941-4954, Aug. 2011.
[17] A. Dandalis and V. K. Prasanna, "An Adaptive Cryptographic Engine for Internet Protocol Security Architectures," ACM Trans. Design Automation of Electronic Systems, Vol. 9, no. 3, pp.333-353, 2004.
[18] C. P. Young, C. C. Chia, L.B. Chen, and I. J. Huang, "On-Chip-Network cryptosystem: A high throughput and high security architecture," IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2008), Macao, 2008.
[19] N. S. Laovs, A. Priftis, P. Kitsos, and O. Koufopavlou,"Reconfigurable crypto process design of encryption algorithms operation modes methods and FPGA integration," Proceedings of the IEEE International Midwest Symposium on Circuits and Systems, pp. 811–814, 2003.
[20] National Institute of Standards and Technology (NIST). (2003), "Recommendation of block cipher security methods and techniques,"
http://csrc.nist.gov/.
[21] A. Alshamsi and T. Saito, "A technical comparison of IPSec and SSL," 19th International Conference on Advanced Information Networking and Applications, AINA 2005.
[22] R. Taylor and S. Goldstein, "A High-Performance Flexible Architecture for Cryptography," Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, pp. 231-245, 1999.
[23] A. J. Elbirt, and P. Christof, "An Instruction-Level Distributed Processor for symmetric-Key Cryptography," IEEE Trans. Parallel and Distributed Systems, Vol. 16, No. 5, pp.468-480, 2005.
[24] B. L, Hutchings, and M.J. Wirthlin,” Implementation Approaches for Reconfigurable Logic Applications,” Field-Programmable Logic and Applications, pp.419- 428, 1995.
[25] L. Wu, C. Weaver, and T. Austin, "CryptoManiac: A Fast Flexible Architecture for Secure Communication," Proceedings of the IEEE International Symposium on Computer Architecture, pp. 110–119, 2001.
[26] Kitsos, P., et al., "64-bit Block ciphers: hardware implementations and comparison analysis," Computers and Electrical Engineering, Vol. 30, No.8, pp. 593-604, 2004.
[27] A. Dandalis,V. K. Prasanna, and J. Rolim,"A Comparative Study of Performance of AES Final Candidates Using FPGAs," In Proc. Cryptographic Hardware and Embedded Systems Workshop, CHES, p. 17-18, 2000.
[28] DATA ENCRYPTION STANDARD (DES).
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.
[29] P. Kitsos, S. Goudevenos, and O. Koufopavlou, "VLSI implementations of the triple-DES block cipher. Electronics Circuits and Systems," ICECS 2003.
[30] P. Hamalainen, et al., "Configurable hardware implementation of triple-DES encryption algorithm for wireless local area network," IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001. Proceedings.(ICASSP'01), 2001.
[31] ML310 development kit,
http://140.116.245.161/MT/Xilinx_ML310_1061513-03/datasheets.html.
[32] Processor Local Bus (PLB) v3.4 (v1.02a) Specification, http://www.xilinx.com/.
[33] Free open source IP cores and chip design, http://www.opencores.org, 2006.
[34] PLB IPIF (v2. 02a), DS448., http://www.xilinx.com/.
[35] I. Kim, C.S. Steele, and J.G. Koller, “A Fully Pipelined, 700MBytes/s DES Encryption Core,”. Proceedings of Ninth Great Lakes Symposium on VLSI, p. 386, 1999
[36] Dandalis, A., V.K. Prasanna, and J.D.P. Rolim, A Comparative Study of Performance of AES Final Candidates Using FPGAs. Proc. Cryptographic Hardware and Embedded Systems Workshop, CHES, 2000: p. 17-18.
[37] K. Gaj and P. Chodowiec, "Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays," Proc. RSA Security Conference-Cryptographer's Track, April, 2001.
[38] Kitsos, P., et al., "64-bit Block ciphers: hardware implementations and comparison analysis," Computers and Electrical Engineering, 2004. 30(8): p. 593-604.
[39] M. McLoone, and J.V. McCanny, "A high performance FPGA implementation of DES. Signal Processing Systems," IEEE Workshop on SiPS 2000. pp. 374-383.
[40] Y. B. Lin, "Software and Hardware Design of a Multi-cipher Cryptosystem for Embedded Systems," Master thesis, Department of Computer Science and Information Engineering, National Cheng Kung University, 2008.
[41] S. P. Singh, S. Bhoj, D. Balasubramanian, T. Nagda, D. Bhatia, and P. Balsara, "Network interface for NoC based architectures," International Journal of Electronics Vol. 94, Iss. 5, 2007.
[42] S. Lupetti, "Data popularity and shortest-job-first scheduling of network transfers," International Conference on Digital Telecommunications, ICDT '06,pp.26, 2006.
[43] J. Wolkerstorfer, E. Oswald, and M. Lamberger, "An ASIC implementation of the AES SBoxes," Proc. RSA Conference, 2002.
[44] I. Verbauwhede, P. Schaumont, and H. Kuo, "Design and performance testing of a 2.29-GB/s Rijndael processor," IEEE Journal of Solid-State Circuits, Vol 38, Issue 3, pp. 569-572, 2003.
[45] A. Hodjat, and I. Verbauwhede, "Speed-area trade-off for 10 to 100 Gbits/s throughput AES processor," Signals, Conference Record of the Thirty-Seventh Asilomar Conference on Systems and Computers, 2003.
[46] C. Caltagirone and K. Anantha, "High throughput, parallelized 128-bit AES encryption in a resource-limited FPGA," Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures, pp. 240-241,2003.
[47] G. Rouvroy, et al., "Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis," IEEE TRANSACTIONS ON COMPUTERS, pp. 473-482, 2003.
[48] G. Rouvroy, et al., "Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES," Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays, pp. 247-247, 2003.
[49] K.Yoshigoe, and K. J. Christensen, "A Parallel-Polled Virtual Output Queued Switch with a Buffered Crossbar," IEEE HPSR, pp.271-275, May. 2001.
[50] A. Zitouni, M. Zid, S. Badrouchi, and R. Tourki, "A Generic and Extensible Spidergon NoC," World Academy of Science, Engineering and Technology 31 2007.
[51] Spidergon STNoC Design Flow
http://www.comcas.eu/publications/Spidergon_STNoC_Design.pdf.
[52] M. Moadeli, A. Shahrabi, W. Vanderbauwhede, and Ould-Khaoua, "An Analytical Performance Model for the Spidergon NoC," AINA, pp.1014-1021, 21st International Conference on Advanced Networking and Applications (AINA '07), 2007.
[53] M. Moadeli1, P. Maji2, W. Vanderbauwhede, "Quarc: a High-Efficiency Network on-Chip Architecture," International Conference on Advanced Information Networking and Applications, AINA '09, pp. 98-105, 2009.
[54] "aEqualized:a Novel Routing Algorithm For The Spidergon Network On Chip",
http://www.date-conference.com/proceedings/PAPERS/2009/DATE09/PDFFILES/07.3_1.PDF.
[55] SoC Interconnection: Wishbone,
http://opencores.org/opencores,wishbone.
[56] Beyond MAC 10/100/1000 Ethernet Controller,
http://www.beyondsemi.com/file/499/files/gbethernet_datasheet.pdf.
[57] ENC424J600/624J600 Data Sheet,
http://ww1.microchip.com/downloads/en/devicedoc/39935c.pdf.
[58] Y. Ming, N. S. Artan, and H. J. Chao, "CNoC: High-Radix Clos Network-on-Chip," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 30, Issue 12, pp.1897-1910, 2011.
[59] P.P. Pande et al., “Performance Evaluation and design Trade-offs for Network-on-Chip Interconnect Architectures,” IEEE Trans. Computers, vol. 54, pp. 1025-1040, Aug. 2005.
[60] C. P. Young, C. C. Chia, and Y. B. Lin,"The design and transport latency analysis of a locality-aware network on chip architecture," IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2008), Macao. Nov. 30, 2008.
[61] C. P. Young, C. C. Chia, L.B. Chen, and I. J. Huang, "NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (IIHMSP '08) , Harbin, 15-17 Aug. 2008.
[62] C. P. Young, Y. B. Lin, and C. C. Chia, "Software and hardware design of a multi-cipher cryptosystem" IEEE TENCON 2009, Singapore. 23-26 Jan. 2009.
校內:2017-09-14公開