Survey of Commercially available chips and IP cores implementing cryptographic algorithms

Size: px
Start display at page:

Download "Survey of Commercially available chips and IP cores implementing cryptographic algorithms"

Transcription

1 Survey of Commercially available chips and IP cores implementing cryptographic algorithms Prepared by - Micheal Dugan, Prajakta Gogte, Prerna Arora Prepared for - ECE 646, Prof. Kris Gaj December 19, 2005

2 Overview Goals IPcores: Detailed explanation, types, uses, etc Comparison parameters Best of class Cryptographic Chips Detailed explanation, types, uses, etc Comparison parameters Best of class Conclusion

3 Goals Perform a market survey to determine published IP core & Cryptographic chip data Populate separate comparison matrices for IP cores & Crypto chips Use comparison matrices and analyze performance parameters to form a best of class comparison

4 Need for IP cores Number of gates in a chip can reach several millions due to rapidly growing chip technology reuse of the existing designs becomes a very important concept in design methodology accelerates the development of new products to meet today s time-to-market challenges Another advantage of reusing the existing blocks is to reduce the possibility of failure based on design and verification of a block for the first time.

5 IP cores These pre designed modules are commonly called Intellectual Property (IP) cores. It is a block of logic or data that is used in making a field programmable gate array (FPGA) or an applicationspecific integrated circuit (ASIC) for a product. An IP core should be entirely portable - that is, able to easily be inserted into any vendor technology or design methodology.

6 IP cores The difference between a block on a single design (chip) and an IP core is that the signaling protocol and the clock parameters can be significantly different between chips. An IP core needs to be flexible enough to handle these differences Some examples of IP cores are Universal Asynchronous Receiver/Transmitter (UART), central processing units, Ethernet controllers, and PCI interfaces.

7 IP core categories Hard IP cores Hard cores are physical manifestations of the IP design. Integration is simple and the core can be dropped into a SOC physical design with very less effort. Technology dependent. Provide minimum flexibility and portability in reconfiguration and integration across multiple designs and technologies. They are best for plug-and-play applications.

8 Soft IP cores Delivered as RTL (Register transfer level) VHDL codes to provide functional descriptions of IP cores. Offer maximum flexibility and re configurability to match the requirements of a specific design application. Being synthesizable, are compatible with the ASIC design flow. Therefore, the quality of a soft IP is highly dependent on the effort needed in the IP integration stage of SOC design.

9 Firm IP cores They use the advantages of both hard cores and soft cores. Balance the high performance and optimization properties of hard IP cores with the flexibility of soft IP cores. These cores are delivered in the form of netlists (a list of the logic gates and associated interconnections making up an integrated circuit). They have a higher level of optimization and are targeted for a specific device architecture. They are less portable than soft cores.

10 Commercially Available Cryptographic IP core Vendors (by Algorithm) Algorithm AES Vendors IPCores, Actel, Altera, Helion, Cast, Athena group, Inc, Vocal Technologies, Ltd. DES Triple DES MD5 SHA-1 Actel, Alliance core (Xilinx), Helion, Cast, Athena Actel, Algotronix, Helion, Cast, Athena Helion, Cast, Amphion, Silicon designs International, Inc Helion, Cast, Amphion, Silicon designs International, Inc, Athena group, Inc SHA-256 Helion, Cast, Cadence, HDL design use

11 IP Core Comparison Parameters Throughput- It is the data throughput in (bits/sec) which is a product of clock frequency in MHz and the number of bits of data per the number of clock cycles (bits/cycles) Maximum frequency (Master clock)- performance in MHz Number of clock cycles- Number of clock cycles of operation Core support for encryption and decryption- specifies whether the same core can be used for both encryption and decryption

12 Area/Resources- Represents the total number of cells/slices/gates used for the design of the IP core Key size- Number of bits of the key Message digest output- Number of bits of the hash value (Message digest) Modes of operation- specifies the modes the core supports

13 AES comparison chart Vendor Key size (bits) Cores IP Cores 128 Advanced versions support both encryption and decryption with the same core Actel 128 Encryption and Decryption possible with the same core Amphio n Helion 128, 192, 256 Cast 128, 192, 256 Athena 128, 192, Separate for Encryption and Decryption Separate for Encryption and Decryption Encryption and Decryption possible with the same core Encryption and Decryption possible with the same core Modes of operation ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR Throughput Area Clock frequenc y (MHz) 0.8, 1.6, 3.2, 6.4 bits per clock cycle- as a function of data path width of 8, 16, 32, 64 bits 224, 102, 291 Mbps Depending on the family Standard > 500 Mbps Fastest > 2 Gbps 157, 157, 183, 295, 316, 400 Mbps depending on the family 2948 gates (TSMC 0.18 micro) / 639 LUT(Altera FPGA) /236 SLICES(Xilinx FPGA) cells/tiles 5193, 5555, 3112 Pipelined 203K gate design Standard < 6K Fastest < 57K 450, 450, 425, 365, 365, 244 LEs 75, 35, > , 54, 63, 102, 109, 138 > 1Gbps 100

14 DES comparison chart Vendor Key size (bits) Modes of operation Actel 64 ECB, CBC, OFB, CFB, MAC Throughput Area Clock frequency 320 Mbps 1271 gates 80 MHz- ProASIC3/E family Amphion kgate design Helion 64 ECB, CBC, OFB, CFB, MAC 200MHz Clock cycles 16 clock cycles to encrypt/decry pt 64 bits > 1.25 Gbps < 6K gates > 180 MHz 8 -encryption cycle load/unload Cast 56 ECB, CBC, OFB, CFB 438,438,355,568 LEs Depends on the family supported 83,84,97,190 MHz depending upon supported family 16 clock cycles-for encryption and decryption Athena 56 ECB, CBC, OFB, CFB > 500 Mbps For all vendors - Same core is used for encryption and decryption

15 Triple DES comparison chart Vendo r Key size Cores Modes of operation Throughput Area Clock frequency Clock cycles Actel 168 bits 3-56 bit keys Encryption and Decryption possible with the same core All DES modes- ECB, CBC, OFB, CFB 300 Mbps- ProASIC3/E 1413 cells/tiles 75 MHz- ProASIC3/E family 48 clock cycles to encrypt/decryp t 64 bits Amph ion 112-bit and 168-bit key length, 2 or 3 keys Encryption and Decryption possible with the same core 56.7 kgate design 200MHz Helion 112-bit and 168-bit key length, 2 or 3 keys Same core offers dynamically selectable DES/3DES and encrypt/decrypt modes All DES modes- ECB, CBC, OFB, CFB, MAC > 460 Mbps < 6K gates > 180 MHz 24 clock cycles Cast 112 or 168 bits 2 or 3 keys Encryption and Decryption possible with the same core All DES modes- ECB, CBC, OFB, CFB Serial mode bits/cycle Partially pipeleined- 4 bits/cycle 1720, 1699, 1757 LEs Depends upon family supported 64, 82, 190 MHz Serial mode- Encryption nad decryption in 48 clock cycles Partially pipelined- 16 clock cycles Athen a 112 bit keys Encryption and Decryption possible with the same core All DES modes- ECB, CBC, OFB, CFB > 500 Mbps

16 Vendor Throughput (Mbps) MD5 comparison chart Clock frequency Helion MHz 65 per algorithm step + 1 clock loading per 512 bit block Cast 25, 26, 39, 60, 69, 115 MHz Amphion Silicon designs Internatio nal, Inc >212MHz operation Clock cycles Area Applications 65 master cycles (1 clock per algorithm step + 1 clock load) MHz 64 clocks to process single block (512 bits) of data 16 K gates Hardware implemetation of Internet standard HMAC(RFC2104) used for IPSec and SSL protocols, digital signatures 2262, 2261, 2285, 2290, 1527, 1259 LEs for Flex, Acex, Apex, Apex 2, Cyclone, Stratix 1, Stratix 2 families 24-kgate design 324 CLBs (1296 logic cells) For all vendors - Message digest output is 128 bit MD Electronic fund transfer, data transfer,encrypted data storage electronic financial transactions, personal mobile communications, secure corporate communications and secure environments. used with the DSA in electronic mail, Electronic funds transfer, software distribution, data storage, And other applications, which require data integrity assurance and data origin authentication. The MD5 may also be used whenever it is necessary to generate a condensed version of a Message.

17 Best of class IP cores AES algorithm: Based on throughput with one key size = 128 bits Best core: Altera AES algorithm: Based on throughput with varying key sizes of 128, 192, 256 bits Best cores: Vocal, Helion, Athena Vendor IPCores Actel Altera Vendor Helion Cast Athena Vocal Technologies Throughput 80 Mbps 224 Mbps > 2.5 Gbps Throughput > 2 Gbps 400 Mbps > 1 Gbps > 2.5 Gbps

18 AES algorithm- Based on core support for both encryption and decryption Vendor IPCores Actel Altera Helion Cast Athena Same core / separate core Same core for encryption and decryption Same core for encryption and decryption Separate core for encryption and decryption Separate core for encryption and decryption Same core for encryption and decryption Same core for encryption and decryption

19 AES algorithm- Based on the area/ number of resources Best cores: Cast, IPCores, Helion Vendor Area in number of Logic cells IPCores 472 Actel 3112 Altera 6117 Helion 500 Cast 300

20 AES algorithm- Based on the clock frequency Best core: Helion Vendor Frequency (MHz) IPCores 200 Actel 100 So, based on these observations, the best of all AES cores is the Helion Technology AES core, the next best could be Actel AES core. Altera 120 Helion > 200 Cast 138 Athena 100

21 DES algorithm- Based on throughput Helion, Athena, Alliance have the top 3 DES throughputs Vendor Actel Alliance Helion Athena Throughput 320 Mbps 500 Mbps > 1.25 Gbps > 500 Mbps DES algorithm- Based on clock frequency So, based on these observations, the best of all DES cores is the Helion Technology DES core. Vendor Frequency(MHz) Actel 80 Alliance 63 Helion > 180 Cast 190

22 Triple DES algorithm- Based on throughput Athena, Helion, Xilinx have the top 3 DES throughputs Vendor Actel Helion Cast Athena Xilinx Throughput 320 Mbps > 460 Mbps 240 Mbps > 500 Mbps 500 Mbps Triple DES algorithm- Based on clock frequency Helion, Cast, Algotronix have the top3 3DES frequencies. Vendor Frequency (MHz) Actel 75 Algotronix 90 Helion > 180 Cast 190

23 Triple DES algorithm- Based on area / resources So, based on these observations, the best of all Triple DES cores is the Helion Technology Triple DES core. Vendor Area in number of Logic cells Actel 1413 Algotronix 1450 Helion 1000 Cast 1720

24 MD5 algorithm - Based on clock frequency Amphion, Helion, Cast have the top 3 MD5 frequencies. MD5 algorithm - Based on area / resources So, based on these observations, the best of all MD5 cores is the Amphion MD5 core and the next best is the Helion Technology MD5 core. Vendor Frequency (MHz) Helion 145 Cast 115 Amphion > 212 Silicon design, Inc Vendor 50 Area in number of Logic cells Helion Approx 2500 Cast Approx 4000 Amphion 2262 Silicon Design Itnl, Inc 1296

25 SHA-1 algorithm - Based on throughput Helion, Cast, Athena have the top 3 SHA-1 throughputs. SHA-1 algorithm - Based on frequency Helion, Cast, Athena have the top 3 SHA-1 frequencies Vendor Throughput (Mbps) Helion 1810 Cast 1156 Silicon Design Itnl, Inc Athena 640 Vendor Frequency (MHz) Helion 290 Cast 183 Silicon Design Itnl, Inc 66 Athena 100

26 SHA-1 algorithm - Based on clock cycles So, based on these observations, the best of all SHA-1 cores is the Helion Technology SHA-1 core. Vendor Number of clock cycles for 512 bit data Helion 82 Cast 65 Silicon Design Itnl, Inc 80 Amphion 82

27 SHA-256 algorithm - Based on throughput Helion, Cast, Cadence are the top 3 Vendor Helion Cast Cadence HDL Design Throughput 1963 Mbps Mbps 971 Mbps 1395 Kbps(Red Hat Linux system) SHA-256 algorithm - Based on frequency So, based on these observations, the best of all SHA-256 cores is the Helion Technology SHA-256 core. Vendor Frequency (MHz) Helion 253 Cast 62 Cadence 133 HDL Design 550

28 Cryptographic Chips

29 What are cryptographic chips? Fully implemented hardware chips that provide not only cryptographic logic but also all necessary interfaces and I/O connections Ready for implementation. Off-the-shelf

30 Typical Applications Virtual Private Networks (IPSec) SSL server connection Firewalls Routers (from small to enterprise) Secure storage Wireless Access Points RF communications

31 Ten Vendors found Atmel Broadcom Cavium SafeNet Harris HIFN IBM Mykotronx Sinosun Philips Among these vendors there are 44 different cryptographic chips

32 Parameters Found Encryption & Hash Algorithms and modes supported RNG Speed and whether its HW or pseudo Throughput for AES-128, -192, -256 Throughput for DES and Triple-DES Throughput for IPSec-AES or 3DES Throughput for SSL RSA bit length, signatures or verifications/sec, and time to generate key pair DSA signatures or verifications/sec Diffie-Hellman key exchanges/sec Clock Freq (both core and interface) Package type (TQFP, PBGA, etc) & dimensions Supported Interfaces (pci, pcix) Certification (FIPS, EAL, CC, etc) Voltage (both signal and Vcc)

33 Best of class Highest Throughput for IPSec-AES Highest Throughput for IPSec-3DES Fastest Implementations of RSA Fastest Implementations of DSA Fastest Implementations of Diffie-Hellman Which chips implement the most algorithms Speed of RNG

34 Highest Throughput for IPSec-AES Crypto chip Throughput Application Cavium Nitrox II Broadcom BCM5841 HIFN 8350 HIFN 4350 (tied for 3rd) Cavium Nitrox & SafeXcel 1842 (tied for 4th) HIFN 8300 HIFN 4300 (tied for 5th) 10 Gbps 4.8 Gbps 4 Gbps 3.2 Gbps 2 Gbps VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup High performance, and can be used with multiple 5841's in an enterprise router Applications for High-end entrprise security services VPNs, Firewalls, Server security and secure storage VPN Gateway, Router Gateways / Applications like Mid to high range VPN security devices Applications for High-end entrprise security services VPNs, Firewalls, Server security and secure storage

35 Highest Throughput for IPSec-3DES Crypto chip Throughput Application Cavium Nitrox II HIFN 8350 HIFN 4350 (tied for 2st) 10 Gbps 4 Gbps VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup Applications for High-end entrprise security services VPNs, Firewalls, Server security and secure storage Cavium Nitrox 3.2 Gbps VPN Gateway, Router Gateways Broadcom BCM5840 HIFN Gbps 2.3 Gbps High performance (wire speed) security applications. This would be connected to the NPU to create a secure solution for an enterprise router or layer 3 switch Applications for High-end entrprise security services in multi service appliances

36 Fastest Implementations of RSA (Signatures/sec using 1024bit) Crypto chip Cavium Nitrox I Cavium Nitrox II Broadcom BCM5825 Sig/sec (1024-b) Application VPN Gateway, Router Gateways IBM Otello 3300 SafeXcel VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup High performance embedded VPN solutions Proprietary chip embedded in the PCIXXC board Applications like Mid to high range VPN security devices

37 Fastest Implementations of DSA (Signatures/sec 1024 bit) Crypto chip Sig/sec (1024-b) SafeXcel SafeXcel 1841&1840 (tied for 2nd) 1250 HIFN Broadcom HIFN Application Applications like Mid to high range VPN security devices Applications like Mid to high range VPN security devices Applications for High-end entrprise security services VPNs, Firewalls, Server security For VPN and secure electronic commerce devices For High-end (gigabit Ethernet) channels to secure storage and data repositories

38 Fastest Implementations of Diffie- Hellman (exchanges/sec) Crypto chip Cavium Nitrox I Cavium Nitrox II Broadcom BCM5825 Cavium Nitrox Lite SafeXcel 1842 D-H Key Gen/sec Application VPN Gateway, Router Gateways VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup High performance embedded VPN solutions 1500 SOHO-VPN gateways and routers 1425 Applications like Mid to high range VPN security devices

39 Chips That Implement the most algorithms SafeXcel 1840, 1841, 1842 Broadcom 5812, 5823, 5825 Cavium Nitrox Lite, Nitrox I, & Nitrox II HIFN 7814, 7815, 7851, 7854, 7855, 7954, 7955, 7956, 8054, 8065 Symmetric: DES, 3DES, AES (128, 192, 256), ARC4 Modes of Operation: ECB, CBC, OFB, CFB Hash Algorithms: MD5, SHA-1, HMAC-MD5. HMAC-SHA-1 Public Key: RSA, DSA, DH

40 Speed of RNG Crypto chips Cavium Nitrox II Cavium Nitrox I Cavium Nitrox Lite RNG Speed TRNG Application 320 Mbps Y VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup 200 Mbps Y VPN Gateway, Router Gateways 100 Mbps ** SOHO-VPN gateways and routers SafeXcel 1840, 1841, 1842 SafeXcel Mbps Y 1Mbps Y Applications like Mid to high range VPN security devices Applications like low to Mid range VPN security devices ** The datasheet did not specify

41 Best of Class 1st Cavium Nitrox II 2nd Cavium Nitrox 1 3rd SafeXcel th HIFN th HIFN 4350

42 Conclusion In Summary: The Best IP core among all Algorithms is by: Helion Technologies The Best Cryptographic Chip among all parameters is: Cavium Networks Nitrox II

43 Questions?

Survey of commercially available cryptographic chips and IP cores implementing cryptographic algorithms (December 2005)

Survey of commercially available cryptographic chips and IP cores implementing cryptographic algorithms (December 2005) 1 Survey of commercially available cryptographic s and IP cores implementing cryptographic algorithms (December 2005) P. Arora, M. Dugan, P. Gogte, GMU Abstract The objective for this project is to analyze

More information

AES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications

AES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (less than 3,000 gates). Enhanced versions

More information

ECC1 Core. Elliptic Curve Point Multiply and Verify Core. General Description. Key Features. Applications. Symbol

ECC1 Core. Elliptic Curve Point Multiply and Verify Core. General Description. Key Features. Applications. Symbol General Description Key Features Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called elliptic curves and it is a part of the Suite B of cryptographic

More information

Lecture 11. Security Protocols. Cryptographic Standards. Companies Developing Cryptographic Hardware

Lecture 11. Security Protocols. Cryptographic Standards. Companies Developing Cryptographic Hardware Lecture 11 Security Protocols Cryptographic Standards Companies Developing Cryptographic Hardware Secure Communication Systems (e.g., DMS) Security protocols (e.g., S-MIME, SSL, IPSec) Security mechanisms

More information

Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays

Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays Kris Gaj and Pawel Chodowiec Electrical and Computer Engineering George Mason University Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable

More information

Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware

Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware Master s Thesis Pawel Chodowiec MS CpE Candidate, ECE George Mason University Advisor: Dr. Kris Gaj, ECE George

More information

Configuration of an IPSec VPN Server on RV130 and RV130W

Configuration of an IPSec VPN Server on RV130 and RV130W Configuration of an IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote access to corporate resources by establishing an encrypted tunnel

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

Scaling Acceleration Capacity from 5 to 50 Gbps and Beyond with Intel QuickAssist Technology

Scaling Acceleration Capacity from 5 to 50 Gbps and Beyond with Intel QuickAssist Technology SOLUTION BRIEF Intel QuickAssist Technology Scaling Acceleration Capacity from 5 to 5 Gbps and Beyond with Intel QuickAssist Technology Equipment manufacturers can dial in the right capacity by choosing

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

Security IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y

Security IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing l e a d i n g t h e w a y l e a d i n g t h e w a y Secure your sensitive content, guarantee its integrity and

More information

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

Symantec Corporation

Symantec Corporation Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its

More information

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,

More information

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network

More information

Anand Raghunathan

Anand Raghunathan ECE 695R: SYSTEM-ON-CHIP DESIGN Module 2: HW/SW Partitioning Lecture 2.26: Example: Hardware Architecture Anand Raghunathan raghunathan@purdue.edu ECE 695R: System-on-Chip Design, Fall 2014 Fall 2014,

More information

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test ECE 646 Fall 2009 Final Exam December 15, 2009 Multiple-choice test 1. (1 pt) Parallel processing can be used to speed up the following cryptographic transformations (please note that multiple answers

More information

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009 Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety

More information

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its

More information

Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining

Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining Pawel Chodowiec, Po Khuon, Kris Gaj Electrical and Computer Engineering George Mason University Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining http://ece.gmu.edu/crypto-text.htm

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO.

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATION iii xii xiv xvii 1 INTRODUCTION 1 1.1 GENERAL 1 1.2 TYPES OF WIRELESS COMMUNICATION

More information

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3

More information

Early Models in Silicon with SystemC synthesis

Early Models in Silicon with SystemC synthesis Early Models in Silicon with SystemC synthesis Agility Compiler summary C-based design & synthesis for SystemC Pure, standard compliant SystemC/ C++ Most widely used C-synthesis technology Structural SystemC

More information

256 Fpga Ip Cores Altera

256 Fpga Ip Cores Altera We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with 256 fpga ip cores altera.

More information

IOS Common Cryptographic Module (IC2M)

IOS Common Cryptographic Module (IC2M) IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION

More information

Digital Integrated Circuits

Digital Integrated Circuits Digital Integrated Circuits Lecture 9 Jaeyong Chung Robust Systems Laboratory Incheon National University DIGITAL DESIGN FLOW Chung EPC6055 2 FPGA vs. ASIC FPGA (A programmable Logic Device) Faster time-to-market

More information

Silent Circle Mobile Application Cryptographic Module

Silent Circle Mobile Application Cryptographic Module FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174

More information

An Introduction to Programmable Logic

An Introduction to Programmable Logic Outline An Introduction to Programmable Logic 3 November 24 Transistors Logic Gates CPLD Architectures FPGA Architectures Device Considerations Soft Core Processors Design Example Quiz Semiconductors Semiconductor

More information

Route1 FIPS Cryptographic Module

Route1 FIPS Cryptographic Module Route1 FIPS Cryptographic Module Security Policy Version 2.1.0.3 July 10, 2008 Strong encryption technology for software developers Contact Information Route1 Inc., 155 University Avenue, Suite 1920 Toronto,

More information

Cisco VPN 3002 Hardware Client Security Policy

Cisco VPN 3002 Hardware Client Security Policy Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,

More information

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R) Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of

More information

Hardware Cryptography and z/tpf

Hardware Cryptography and z/tpf z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any

More information

ECE 545 Lecture 8b. Hardware Architectures of Secret-Key Block Ciphers and Hash Functions. George Mason University

ECE 545 Lecture 8b. Hardware Architectures of Secret-Key Block Ciphers and Hash Functions. George Mason University ECE 545 Lecture 8b Hardware Architectures of Secret-Key Block Ciphers and Hash Functions George Mason University Recommended reading K. Gaj and P. Chodowiec, FPGA and ASIC Implementations of AES, Chapter

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

Field Programmable Gate Array (FPGA) Devices

Field Programmable Gate Array (FPGA) Devices Field Programmable Gate Array (FPGA) Devices 1 Contents Altera FPGAs and CPLDs CPLDs FPGAs with embedded processors ACEX FPGAs Cyclone I,II FPGAs APEX FPGAs Stratix FPGAs Stratix II,III FPGAs Xilinx FPGAs

More information

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0. BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May

More information

Crypto Hardware Design for

Crypto Hardware Design for Crypto Hardware Design for Embedded Applications Dr. Amlan Chakrabarti & Mr. Suman Sau Real Time EmbeddedSystem Research Group A.K.Choudhury School of Information Technology University of Calcutta email:acakcs@caluniv.ac.in

More information

Park Sung Chul. AE MentorGraphics Korea

Park Sung Chul. AE MentorGraphics Korea PGA Design rom Concept to Silicon Park Sung Chul AE MentorGraphics Korea The Challenge of Complex Chip Design ASIC Complex Chip Design ASIC or FPGA? N FPGA Design FPGA Embedded Core? Y FPSoC Design Considerations

More information

ECE 448 Lecture 15. Overview of Embedded SoC Systems

ECE 448 Lecture 15. Overview of Embedded SoC Systems ECE 448 Lecture 15 Overview of Embedded SoC Systems ECE 448 FPGA and ASIC Design with VHDL George Mason University Required Reading P. Chu, FPGA Prototyping by VHDL Examples Chapter 8, Overview of Embedded

More information

Protect Yourself Against Security Challenges with Next-Generation Encryption

Protect Yourself Against Security Challenges with Next-Generation Encryption Protect Yourself Against Security Challenges with Next-Generation Encryption agrieco@cisco.com mcgrew@cisco.com How to detect attacks? Malware Broken encryption 2 How to detect attacks? Malware Host Process

More information

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4. FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,

More information

Cisco VPN Internal Service Module for Cisco ISR G2

Cisco VPN Internal Service Module for Cisco ISR G2 Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services

More information

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 1.3 June 25, 2015 1 Copyright Notice Copyright 2015 Dell Software,

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. FIPS 140-2 Non-Proprietary Security Policy Acme Packet 4500 Document Version 2.5 December 5, 2014 Prepared For: Prepared By: Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 www.oracle.com

More information

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1) Network Working Group P. Hoffman Request for Comments: 4109 VPN Consortium Updates: 2409 May 2005 Category: Standards Track Algorithms for Internet Key Exchange version 1 (IKEv1) Status of This Memo This

More information

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3

More information

Acme Packet 3820 and Acme Packet 4500

Acme Packet 3820 and Acme Packet 4500 FIPS 140-2 Non-Proprietary Security Policy Acme Packet 3820 and Acme Packet 4500 FIPS 140-2 Level 2 Validation Firmware Version ECx 6.4.1 and ECx 6.4.1 M1 Hardware Version A1 August 28, 2015 Copyright

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

FIPS Validation Certificate

FIPS Validation Certificate FIPS 140- Validation Certificate The National Institute of Standards and Technology of the United States of America The Communications Security Establishment of the Government of Canada Certificate No.

More information

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication

RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication Security Policy 02.08.12 RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication This document is a non-proprietary security policy for RSA BSAFE Crypto-J

More information

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform. NCP Secure Enterprise MAC Client Service Release 2.02 Build 11 Date: August 2011 1. New Feature Compatibility to Mac OS X 10.7 Lion This version of the des Secure Enterprise MAC Client can be used on Mac

More information

SECURE PARTIAL RECONFIGURATION OF FPGAs. Amir S. Zeineddini Kris Gaj

SECURE PARTIAL RECONFIGURATION OF FPGAs. Amir S. Zeineddini Kris Gaj SECURE PARTIAL RECONFIGURATION OF FPGAs Amir S. Zeineddini Kris Gaj Outline FPGAs Security Our scheme Implementation approach Experimental results Conclusions FPGAs SECURITY SRAM FPGA Security Designer/Vendor

More information

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

Can High-Level Synthesis Compete Against a Hand-Written Code in the Cryptographic Domain? A Case Study

Can High-Level Synthesis Compete Against a Hand-Written Code in the Cryptographic Domain? A Case Study Can High-Level Synthesis Compete Against a Hand-Written Code in the Cryptographic Domain? A Case Study Ekawat Homsirikamol & Kris Gaj George Mason University USA Project supported by NSF Grant #1314540

More information

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE. INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building

More information

Hardware Architectures

Hardware Architectures Hardware Architectures Secret-key Cryptography Public-key Cryptography Cryptanalysis AES & AES candidates estream candidates Hash Functions SHA-3 Montgomery Multipliers ECC cryptosystems Pairing-based

More information

RSA BSAFE Crypto-C Micro Edition Security Policy

RSA BSAFE Crypto-C Micro Edition Security Policy Security Policy 15.11.12 RSA BSAFE Crypto-C Micro Edition 3.0.0.16 Security Policy This document is a non-proprietary security policy for RSA BSAFE Crypto-C Micro Edition 3.0.0.16 (Crypto-C ME) security

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

CoSign Hardware version 7.0 Firmware version 5.2

CoSign Hardware version 7.0 Firmware version 5.2 CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and

More information

Security with VA Smalltalk

Security with VA Smalltalk 24 th ESUG Conference Prague, Czech Republic August 23, 2016 Security with VA Smalltalk Seth Berman Vice President of Engineering Instantiations, Inc. Agenda Security Overview Architectural Goals OpenSSL

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

Ethernet Switch. WAN Gateway. Figure 1: Switched LAN Example

Ethernet Switch. WAN Gateway. Figure 1: Switched LAN Example 1 Introduction An Ethernet switch is used to interconnect a number of Ethernet LANs (Local Area Networks), forming a large Ethernet network. Different ports of the switch are connected to different LAN

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway If you are using the Amazon Virtual Private Cloud, you can transparently extend your local network to the cloud by connecting both

More information

SHA Core, Xilinx Edition. Core Facts

SHA Core, Xilinx Edition. Core Facts SHA Core, Xilinx Edition May 3, 2017 Product Specification Algotronix 130-10 Calton Road Edinburgh, Scotland United Kingdom, EH8 8JQ Phone: +44 131 556 9242 E-mail: cores@algotronix.com URL: www.algotronix.com

More information

NCP Secure Enterprise macos Client Release Notes

NCP Secure Enterprise macos Client Release Notes Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra

More information

Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays

Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays Kris Gaj and Pawel Chodowiec George Mason University, Electrical and

More information

Basic FPGA Architectures. Actel FPGAs. PLD Technologies: Antifuse. 3 Digital Systems Implementation Programmable Logic Devices

Basic FPGA Architectures. Actel FPGAs. PLD Technologies: Antifuse. 3 Digital Systems Implementation Programmable Logic Devices 3 Digital Systems Implementation Programmable Logic Devices Basic FPGA Architectures Why Programmable Logic Devices (PLDs)? Low cost, low risk way of implementing digital circuits as application specific

More information

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents

More information

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1. Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3

More information

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. NCP Secure Enterprise Mac Client Service Release 2.05 Rev. 32317 Date: January 2017 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677 Non-Proprietary Security Policy for the FIPS 140-2 Level 2 Validated AirFortress Wireless Security Gateway Hardware Model AF7500 (Document Version 2.3) March 2007 Prepared by the Fortress Technologies,

More information

1GbEth. Access Switch. 1GbEth. Workgroup Switch. 10MbEth. Figure 1: Enterprise LAN Topology Example

1GbEth. Access Switch. 1GbEth. Workgroup Switch. 10MbEth. Figure 1: Enterprise LAN Topology Example 1 Introduction Ethernet is available in different speeds (10 and 100Mbps) and provides connectivity to meet a wide range of needs and from desktop to switches. MorethanIP IP solutions provide a solution

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Outline Introduction Approach Research Results Conclusion

More information

ECE 111 ECE 111. Advanced Digital Design. Advanced Digital Design Winter, Sujit Dey. Sujit Dey. ECE Department UC San Diego

ECE 111 ECE 111. Advanced Digital Design. Advanced Digital Design Winter, Sujit Dey. Sujit Dey. ECE Department UC San Diego Advanced Digital Winter, 2009 ECE Department UC San Diego dey@ece.ucsd.edu http://esdat.ucsd.edu Winter 2009 Advanced Digital Objective: of a hardware-software embedded system using advanced design methodologies

More information

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy Symantec Corporation Symantec Cryptographic Module Software Version: 1.1 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.6 Prepared for: Prepared by: Symantec Corporation

More information

FIPS SECURITY POLICY

FIPS SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks SSG-520(M) and SSG-550(M) HW P/N SSG-520, SSG-520M and SSG-550, SSG-550M Version 0000, FW Version ScreenOS 5.4.0r4 Document # 530-020766-01 Juniper SSG-520 and

More information

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology Universal VPN Client Suite for macos/os X Compatible with VPN Gateways (IPsec Standard) macos 10.13, 10.12, OS X 10.11, OS X 10.10 Import of third party configuration files Integrated, dynamic Personal

More information

FIPS SECURITY POLICY

FIPS SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 520M and SSG 550M HW P/N SSG-520M-SH, SSG-520M-SH-N, SSG-520M-SH-DC-N, SSG-520M-N-TAA, SSG-520M-SH-DC-N- TAA, SSG-550M-SH, SSG-550M-SH-N, SSG-550M-SH-DC-N,

More information

Evolution of CAD Tools & Verilog HDL Definition

Evolution of CAD Tools & Verilog HDL Definition Evolution of CAD Tools & Verilog HDL Definition K.Sivasankaran Assistant Professor (Senior) VLSI Division School of Electronics Engineering VIT University Outline Evolution of CAD Different CAD Tools for

More information

FIPS SECURITY POLICY

FIPS SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 5 and SSG 20 HW P/N SSG-5 and SSG-20, FW Version ScreenOS 6.3.0r6 Copyright Notice Copyright 2011 Juniper Networks, Inc. May be reproduced only in

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Use of Embedded FPGA Resources in Implementa:ons of 14 Round 2 SHA- 3 Candidates

Use of Embedded FPGA Resources in Implementa:ons of 14 Round 2 SHA- 3 Candidates Use of Embedded FPGA Resources in Implementa:ons of 14 Round 2 SHA- 3 Candidates Kris Gaj, Rabia Shahid, Malik Umar Sharif, and Marcin Rogawski George Mason University U.S.A. Co-Authors Rabia Shahid Malik

More information

1GbEth. Access Switch. Workgroup Switch. 10MbEth. Figure 1: Enterprise LAN Topology Example

1GbEth. Access Switch. Workgroup Switch. 10MbEth. Figure 1: Enterprise LAN Topology Example 1 Introduction Ethernet is available in different speeds (10/100/1000 and 10000Mbps) and provides connectivity to meet a wide range of needs from desktop to switches. MorethanIP IP solutions provide a

More information

FIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0.

FIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0. FIPS 140-2 Non-Proprietary Security Policy Acme Packet 4600 FIPS 140-2 Level 2 Validation Hardware Version: 4600 Firmware Version: E-CZ8.0.0 Date: July 20 th, 2018 Title: Acme Packet 4600 Security Policy

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information