Design Technology Center National Tsing Hua University IC-SOC Design Driver Highlights Cheng-Wen Wu.

Slides:



Advertisements
Similar presentations
Encryption.
Advertisements

GOPAS TechEd 2012 PKI Design Ing. Ondřej Ševeček | GOPAS a.s. |
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 Cisco 7500 to Cisco 7200 Technical Migration Program PROMOTION December 2006.
CryptoBlaze: 8-Bit Security Microcontroller. Quick Start Training Agenda What is CryptoBlaze? KryptoKit GF(2 m ) Multiplier Customize CryptoBlaze Attacks.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
An Integrated ECC and Redundancy Repair Scheme for Memory Reliability Enhancement National Tsing Hua University Hsinchu, Taiwan Chin-Lung Su, Yi-Ting Yeh,
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
The Hardware Security Module. Agenda MAHOhard members To give background Project details Design and implementation.
Graduate Computer Architecture I Lecture 15: Intro to Reconfigurable Devices.
Advanced Information Security 4 Field Arithmetic
Design Technology Center National Tsing Hua University IC-SOC Design Driver Highlights Cheng-Wen Wu.
The ARM7TDMI Hardware Architecture
Implementation of LSI for Privacy Enhancing Computation Kazue Sako, Sumio Morioka
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Giga-Scale System-On-A-Chip International Center on System-on-a-Chip (ICSOC) Jason Cong University of California, Los Angeles Tel: ,
HASH ALGORITHMS - Chapter 12
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Design of a Reconfigurable Hardware For Efficient Implementation of Secret Key and Public Key Cryptography.
Energy Evaluation Methodology for Platform Based System-On- Chip Design Hildingsson, K.; Arslan, T.; Erdogan, A.T.; VLSI, Proceedings. IEEE Computer.
A Dual Field Elliptic Curve Cryptographic Processor Laboratory for Reliable Computing (LaRC) Electrical Engineering Department National Tsing Hua University.
Configurable System-on-Chip: Xilinx EDK
Presenter: Jyun-Yan Li Multiprocessor System-on-Chip Profiling Architecture: Design and Implementation Po-Hui Chen, Chung-Ta King, Yuan-Ying Chang, Shau-Yin.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Giga-Scale System-On-A-Chip International Center on System-on-a-Chip (ICSOC) Jason Cong University of California, Los Angeles Tel: ,
IC-SOC STEAC: An SOC Test Integration Platform Cheng-Wen Wu.
Giga-Scale System-On-A-Chip International Center on System-on-a-Chip (ICSOC) Jason Cong University of California, Los Angeles Tel: ,
Laboratory for Reliable Computing Department of Electrical Engineering National Tsing Hua University Hsinchu, Taiwan Security Processor: A Review Chih-Pin.
Linux Cryptography overview and How-to’s using OpenSSL
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department.
Security Design for IEEE P1687
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Computer Networks with Internet Technology William Stallings Network Security.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
George L. Heron Technology Officer, SafeNet, Inc..
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
The Misuse of RC4 in Microsoft Office A paper by: Hongjun Wu Institute for Infocomm Research, Singapore ECE 578 Matthew Fleming.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Hyper Threading Technology. Introduction Hyper-threading is a technology developed by Intel Corporation for it’s Xeon processors with a 533 MHz system.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Potential vulnerabilities of IPsec-based VPN
AT91 Products Overview. 2 The Atmel AT91 Series of microcontrollers are based upon the powerful ARM7TDMI processor. Atmel has taken these cores, added.
Lecture 5.1: Message Authentication Codes, and Key Distribution
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Multiprocessor SoC integration Method: A Case Study on Nexperia, Li Bin, Mengtian Rong Presented by Pei-Wei Li.
The Advanced Encryption Standard Part 2: Mathematical Background
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
RSA Data Security, Inc. PKCS #13: Elliptic Curve Cryptography Standard Burt Kaliski RSA Laboratories PKCS Workshop October 7, 1998.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Modified Harvard architecture 8-bit RISC single chip microcontroller Complete System-on-a-chip On Board Memory (FLASH, SRAM & EEPROM) On Board Peripherals.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Aditya Dayal M. Tech, VLSI Design ITM University, Gwalior.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
Design of OCDMA Demonstrator Yun Ping Yang, Alireza Hodjat, Herwin Chan, Eric Chen, Josh Conway.
Jason Cong University of California, Los Angeles Tel: ,
Raspberry Pi.
IBM Z Dataset Encryption: How does the mechanism encryption function?
SSL (Secure Socket Layer)
Presentation transcript:

Design Technology Center National Tsing Hua University IC-SOC Design Driver Highlights Cheng-Wen Wu

drivers2.03DTC, NTHU2 Network Security Processor  Applications: IPSec, SSL, VPN, etc.  Functionalities: Public key: RSA, ECC Secret key: AES Hashing: HMAC (SHA-1/MD5) Truly random number generator  Target technology: 0.18  m or below  Clock rate: 200MHz or higher (internal)  32-bit data and instruction word  10Gbps (OC192)  Power: 1 to 10mW/MHz at 3V (LP to HP)  Die size: 50mm 2  On-chip bus: AMBA

drivers2.03DTC, NTHU3 AMBA  Advanced Microcontroller Bus Architecture  Standard system bus for ARM-based chip  Open standard for SOC on-chip bus Flexible and suitable for a wide range of SOC applications

drivers2.03DTC, NTHU4 Encryption Modules  PKEM Public key encryption module Operations:  Modular multiplication  Multiplication over GF(p) and GF(2 m )  SKEM Secret key encryption module Operations:  Matrix operations, manipulation  RNG Random number generator  FIPS 140-1,140-2 Security Requirements for Cryptographic Modules