Survey of Commercially available chips and IP cores implementing cryptographic algorithms
|
|
- Gilbert Griffin
- 6 years ago
- Views:
Transcription
1 Survey of Commercially available chips and IP cores implementing cryptographic algorithms Prepared by - Micheal Dugan, Prajakta Gogte, Prerna Arora Prepared for - ECE 646, Prof. Kris Gaj December 19, 2005
2 Overview Goals IPcores: Detailed explanation, types, uses, etc Comparison parameters Best of class Cryptographic Chips Detailed explanation, types, uses, etc Comparison parameters Best of class Conclusion
3 Goals Perform a market survey to determine published IP core & Cryptographic chip data Populate separate comparison matrices for IP cores & Crypto chips Use comparison matrices and analyze performance parameters to form a best of class comparison
4 Need for IP cores Number of gates in a chip can reach several millions due to rapidly growing chip technology reuse of the existing designs becomes a very important concept in design methodology accelerates the development of new products to meet today s time-to-market challenges Another advantage of reusing the existing blocks is to reduce the possibility of failure based on design and verification of a block for the first time.
5 IP cores These pre designed modules are commonly called Intellectual Property (IP) cores. It is a block of logic or data that is used in making a field programmable gate array (FPGA) or an applicationspecific integrated circuit (ASIC) for a product. An IP core should be entirely portable - that is, able to easily be inserted into any vendor technology or design methodology.
6 IP cores The difference between a block on a single design (chip) and an IP core is that the signaling protocol and the clock parameters can be significantly different between chips. An IP core needs to be flexible enough to handle these differences Some examples of IP cores are Universal Asynchronous Receiver/Transmitter (UART), central processing units, Ethernet controllers, and PCI interfaces.
7 IP core categories Hard IP cores Hard cores are physical manifestations of the IP design. Integration is simple and the core can be dropped into a SOC physical design with very less effort. Technology dependent. Provide minimum flexibility and portability in reconfiguration and integration across multiple designs and technologies. They are best for plug-and-play applications.
8 Soft IP cores Delivered as RTL (Register transfer level) VHDL codes to provide functional descriptions of IP cores. Offer maximum flexibility and re configurability to match the requirements of a specific design application. Being synthesizable, are compatible with the ASIC design flow. Therefore, the quality of a soft IP is highly dependent on the effort needed in the IP integration stage of SOC design.
9 Firm IP cores They use the advantages of both hard cores and soft cores. Balance the high performance and optimization properties of hard IP cores with the flexibility of soft IP cores. These cores are delivered in the form of netlists (a list of the logic gates and associated interconnections making up an integrated circuit). They have a higher level of optimization and are targeted for a specific device architecture. They are less portable than soft cores.
10 Commercially Available Cryptographic IP core Vendors (by Algorithm) Algorithm AES Vendors IPCores, Actel, Altera, Helion, Cast, Athena group, Inc, Vocal Technologies, Ltd. DES Triple DES MD5 SHA-1 Actel, Alliance core (Xilinx), Helion, Cast, Athena Actel, Algotronix, Helion, Cast, Athena Helion, Cast, Amphion, Silicon designs International, Inc Helion, Cast, Amphion, Silicon designs International, Inc, Athena group, Inc SHA-256 Helion, Cast, Cadence, HDL design use
11 IP Core Comparison Parameters Throughput- It is the data throughput in (bits/sec) which is a product of clock frequency in MHz and the number of bits of data per the number of clock cycles (bits/cycles) Maximum frequency (Master clock)- performance in MHz Number of clock cycles- Number of clock cycles of operation Core support for encryption and decryption- specifies whether the same core can be used for both encryption and decryption
12 Area/Resources- Represents the total number of cells/slices/gates used for the design of the IP core Key size- Number of bits of the key Message digest output- Number of bits of the hash value (Message digest) Modes of operation- specifies the modes the core supports
13 AES comparison chart Vendor Key size (bits) Cores IP Cores 128 Advanced versions support both encryption and decryption with the same core Actel 128 Encryption and Decryption possible with the same core Amphio n Helion 128, 192, 256 Cast 128, 192, 256 Athena 128, 192, Separate for Encryption and Decryption Separate for Encryption and Decryption Encryption and Decryption possible with the same core Encryption and Decryption possible with the same core Modes of operation ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR ECB, CBC, OFB, CFB, CTR Throughput Area Clock frequenc y (MHz) 0.8, 1.6, 3.2, 6.4 bits per clock cycle- as a function of data path width of 8, 16, 32, 64 bits 224, 102, 291 Mbps Depending on the family Standard > 500 Mbps Fastest > 2 Gbps 157, 157, 183, 295, 316, 400 Mbps depending on the family 2948 gates (TSMC 0.18 micro) / 639 LUT(Altera FPGA) /236 SLICES(Xilinx FPGA) cells/tiles 5193, 5555, 3112 Pipelined 203K gate design Standard < 6K Fastest < 57K 450, 450, 425, 365, 365, 244 LEs 75, 35, > , 54, 63, 102, 109, 138 > 1Gbps 100
14 DES comparison chart Vendor Key size (bits) Modes of operation Actel 64 ECB, CBC, OFB, CFB, MAC Throughput Area Clock frequency 320 Mbps 1271 gates 80 MHz- ProASIC3/E family Amphion kgate design Helion 64 ECB, CBC, OFB, CFB, MAC 200MHz Clock cycles 16 clock cycles to encrypt/decry pt 64 bits > 1.25 Gbps < 6K gates > 180 MHz 8 -encryption cycle load/unload Cast 56 ECB, CBC, OFB, CFB 438,438,355,568 LEs Depends on the family supported 83,84,97,190 MHz depending upon supported family 16 clock cycles-for encryption and decryption Athena 56 ECB, CBC, OFB, CFB > 500 Mbps For all vendors - Same core is used for encryption and decryption
15 Triple DES comparison chart Vendo r Key size Cores Modes of operation Throughput Area Clock frequency Clock cycles Actel 168 bits 3-56 bit keys Encryption and Decryption possible with the same core All DES modes- ECB, CBC, OFB, CFB 300 Mbps- ProASIC3/E 1413 cells/tiles 75 MHz- ProASIC3/E family 48 clock cycles to encrypt/decryp t 64 bits Amph ion 112-bit and 168-bit key length, 2 or 3 keys Encryption and Decryption possible with the same core 56.7 kgate design 200MHz Helion 112-bit and 168-bit key length, 2 or 3 keys Same core offers dynamically selectable DES/3DES and encrypt/decrypt modes All DES modes- ECB, CBC, OFB, CFB, MAC > 460 Mbps < 6K gates > 180 MHz 24 clock cycles Cast 112 or 168 bits 2 or 3 keys Encryption and Decryption possible with the same core All DES modes- ECB, CBC, OFB, CFB Serial mode bits/cycle Partially pipeleined- 4 bits/cycle 1720, 1699, 1757 LEs Depends upon family supported 64, 82, 190 MHz Serial mode- Encryption nad decryption in 48 clock cycles Partially pipelined- 16 clock cycles Athen a 112 bit keys Encryption and Decryption possible with the same core All DES modes- ECB, CBC, OFB, CFB > 500 Mbps
16 Vendor Throughput (Mbps) MD5 comparison chart Clock frequency Helion MHz 65 per algorithm step + 1 clock loading per 512 bit block Cast 25, 26, 39, 60, 69, 115 MHz Amphion Silicon designs Internatio nal, Inc >212MHz operation Clock cycles Area Applications 65 master cycles (1 clock per algorithm step + 1 clock load) MHz 64 clocks to process single block (512 bits) of data 16 K gates Hardware implemetation of Internet standard HMAC(RFC2104) used for IPSec and SSL protocols, digital signatures 2262, 2261, 2285, 2290, 1527, 1259 LEs for Flex, Acex, Apex, Apex 2, Cyclone, Stratix 1, Stratix 2 families 24-kgate design 324 CLBs (1296 logic cells) For all vendors - Message digest output is 128 bit MD Electronic fund transfer, data transfer,encrypted data storage electronic financial transactions, personal mobile communications, secure corporate communications and secure environments. used with the DSA in electronic mail, Electronic funds transfer, software distribution, data storage, And other applications, which require data integrity assurance and data origin authentication. The MD5 may also be used whenever it is necessary to generate a condensed version of a Message.
17 Best of class IP cores AES algorithm: Based on throughput with one key size = 128 bits Best core: Altera AES algorithm: Based on throughput with varying key sizes of 128, 192, 256 bits Best cores: Vocal, Helion, Athena Vendor IPCores Actel Altera Vendor Helion Cast Athena Vocal Technologies Throughput 80 Mbps 224 Mbps > 2.5 Gbps Throughput > 2 Gbps 400 Mbps > 1 Gbps > 2.5 Gbps
18 AES algorithm- Based on core support for both encryption and decryption Vendor IPCores Actel Altera Helion Cast Athena Same core / separate core Same core for encryption and decryption Same core for encryption and decryption Separate core for encryption and decryption Separate core for encryption and decryption Same core for encryption and decryption Same core for encryption and decryption
19 AES algorithm- Based on the area/ number of resources Best cores: Cast, IPCores, Helion Vendor Area in number of Logic cells IPCores 472 Actel 3112 Altera 6117 Helion 500 Cast 300
20 AES algorithm- Based on the clock frequency Best core: Helion Vendor Frequency (MHz) IPCores 200 Actel 100 So, based on these observations, the best of all AES cores is the Helion Technology AES core, the next best could be Actel AES core. Altera 120 Helion > 200 Cast 138 Athena 100
21 DES algorithm- Based on throughput Helion, Athena, Alliance have the top 3 DES throughputs Vendor Actel Alliance Helion Athena Throughput 320 Mbps 500 Mbps > 1.25 Gbps > 500 Mbps DES algorithm- Based on clock frequency So, based on these observations, the best of all DES cores is the Helion Technology DES core. Vendor Frequency(MHz) Actel 80 Alliance 63 Helion > 180 Cast 190
22 Triple DES algorithm- Based on throughput Athena, Helion, Xilinx have the top 3 DES throughputs Vendor Actel Helion Cast Athena Xilinx Throughput 320 Mbps > 460 Mbps 240 Mbps > 500 Mbps 500 Mbps Triple DES algorithm- Based on clock frequency Helion, Cast, Algotronix have the top3 3DES frequencies. Vendor Frequency (MHz) Actel 75 Algotronix 90 Helion > 180 Cast 190
23 Triple DES algorithm- Based on area / resources So, based on these observations, the best of all Triple DES cores is the Helion Technology Triple DES core. Vendor Area in number of Logic cells Actel 1413 Algotronix 1450 Helion 1000 Cast 1720
24 MD5 algorithm - Based on clock frequency Amphion, Helion, Cast have the top 3 MD5 frequencies. MD5 algorithm - Based on area / resources So, based on these observations, the best of all MD5 cores is the Amphion MD5 core and the next best is the Helion Technology MD5 core. Vendor Frequency (MHz) Helion 145 Cast 115 Amphion > 212 Silicon design, Inc Vendor 50 Area in number of Logic cells Helion Approx 2500 Cast Approx 4000 Amphion 2262 Silicon Design Itnl, Inc 1296
25 SHA-1 algorithm - Based on throughput Helion, Cast, Athena have the top 3 SHA-1 throughputs. SHA-1 algorithm - Based on frequency Helion, Cast, Athena have the top 3 SHA-1 frequencies Vendor Throughput (Mbps) Helion 1810 Cast 1156 Silicon Design Itnl, Inc Athena 640 Vendor Frequency (MHz) Helion 290 Cast 183 Silicon Design Itnl, Inc 66 Athena 100
26 SHA-1 algorithm - Based on clock cycles So, based on these observations, the best of all SHA-1 cores is the Helion Technology SHA-1 core. Vendor Number of clock cycles for 512 bit data Helion 82 Cast 65 Silicon Design Itnl, Inc 80 Amphion 82
27 SHA-256 algorithm - Based on throughput Helion, Cast, Cadence are the top 3 Vendor Helion Cast Cadence HDL Design Throughput 1963 Mbps Mbps 971 Mbps 1395 Kbps(Red Hat Linux system) SHA-256 algorithm - Based on frequency So, based on these observations, the best of all SHA-256 cores is the Helion Technology SHA-256 core. Vendor Frequency (MHz) Helion 253 Cast 62 Cadence 133 HDL Design 550
28 Cryptographic Chips
29 What are cryptographic chips? Fully implemented hardware chips that provide not only cryptographic logic but also all necessary interfaces and I/O connections Ready for implementation. Off-the-shelf
30 Typical Applications Virtual Private Networks (IPSec) SSL server connection Firewalls Routers (from small to enterprise) Secure storage Wireless Access Points RF communications
31 Ten Vendors found Atmel Broadcom Cavium SafeNet Harris HIFN IBM Mykotronx Sinosun Philips Among these vendors there are 44 different cryptographic chips
32 Parameters Found Encryption & Hash Algorithms and modes supported RNG Speed and whether its HW or pseudo Throughput for AES-128, -192, -256 Throughput for DES and Triple-DES Throughput for IPSec-AES or 3DES Throughput for SSL RSA bit length, signatures or verifications/sec, and time to generate key pair DSA signatures or verifications/sec Diffie-Hellman key exchanges/sec Clock Freq (both core and interface) Package type (TQFP, PBGA, etc) & dimensions Supported Interfaces (pci, pcix) Certification (FIPS, EAL, CC, etc) Voltage (both signal and Vcc)
33 Best of class Highest Throughput for IPSec-AES Highest Throughput for IPSec-3DES Fastest Implementations of RSA Fastest Implementations of DSA Fastest Implementations of Diffie-Hellman Which chips implement the most algorithms Speed of RNG
34 Highest Throughput for IPSec-AES Crypto chip Throughput Application Cavium Nitrox II Broadcom BCM5841 HIFN 8350 HIFN 4350 (tied for 3rd) Cavium Nitrox & SafeXcel 1842 (tied for 4th) HIFN 8300 HIFN 4300 (tied for 5th) 10 Gbps 4.8 Gbps 4 Gbps 3.2 Gbps 2 Gbps VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup High performance, and can be used with multiple 5841's in an enterprise router Applications for High-end entrprise security services VPNs, Firewalls, Server security and secure storage VPN Gateway, Router Gateways / Applications like Mid to high range VPN security devices Applications for High-end entrprise security services VPNs, Firewalls, Server security and secure storage
35 Highest Throughput for IPSec-3DES Crypto chip Throughput Application Cavium Nitrox II HIFN 8350 HIFN 4350 (tied for 2st) 10 Gbps 4 Gbps VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup Applications for High-end entrprise security services VPNs, Firewalls, Server security and secure storage Cavium Nitrox 3.2 Gbps VPN Gateway, Router Gateways Broadcom BCM5840 HIFN Gbps 2.3 Gbps High performance (wire speed) security applications. This would be connected to the NPU to create a secure solution for an enterprise router or layer 3 switch Applications for High-end entrprise security services in multi service appliances
36 Fastest Implementations of RSA (Signatures/sec using 1024bit) Crypto chip Cavium Nitrox I Cavium Nitrox II Broadcom BCM5825 Sig/sec (1024-b) Application VPN Gateway, Router Gateways IBM Otello 3300 SafeXcel VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup High performance embedded VPN solutions Proprietary chip embedded in the PCIXXC board Applications like Mid to high range VPN security devices
37 Fastest Implementations of DSA (Signatures/sec 1024 bit) Crypto chip Sig/sec (1024-b) SafeXcel SafeXcel 1841&1840 (tied for 2nd) 1250 HIFN Broadcom HIFN Application Applications like Mid to high range VPN security devices Applications like Mid to high range VPN security devices Applications for High-end entrprise security services VPNs, Firewalls, Server security For VPN and secure electronic commerce devices For High-end (gigabit Ethernet) channels to secure storage and data repositories
38 Fastest Implementations of Diffie- Hellman (exchanges/sec) Crypto chip Cavium Nitrox I Cavium Nitrox II Broadcom BCM5825 Cavium Nitrox Lite SafeXcel 1842 D-H Key Gen/sec Application VPN Gateway, Router Gateways VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup High performance embedded VPN solutions 1500 SOHO-VPN gateways and routers 1425 Applications like Mid to high range VPN security devices
39 Chips That Implement the most algorithms SafeXcel 1840, 1841, 1842 Broadcom 5812, 5823, 5825 Cavium Nitrox Lite, Nitrox I, & Nitrox II HIFN 7814, 7815, 7851, 7854, 7855, 7954, 7955, 7956, 8054, 8065 Symmetric: DES, 3DES, AES (128, 192, 256), ARC4 Modes of Operation: ECB, CBC, OFB, CFB Hash Algorithms: MD5, SHA-1, HMAC-MD5. HMAC-SHA-1 Public Key: RSA, DSA, DH
40 Speed of RNG Crypto chips Cavium Nitrox II Cavium Nitrox I Cavium Nitrox Lite RNG Speed TRNG Application 320 Mbps Y VPN Gateway, IPSEC & SSL Server connections, Server Load balancing, and Server backup 200 Mbps Y VPN Gateway, Router Gateways 100 Mbps ** SOHO-VPN gateways and routers SafeXcel 1840, 1841, 1842 SafeXcel Mbps Y 1Mbps Y Applications like Mid to high range VPN security devices Applications like low to Mid range VPN security devices ** The datasheet did not specify
41 Best of Class 1st Cavium Nitrox II 2nd Cavium Nitrox 1 3rd SafeXcel th HIFN th HIFN 4350
42 Conclusion In Summary: The Best IP core among all Algorithms is by: Helion Technologies The Best Cryptographic Chip among all parameters is: Cavium Networks Nitrox II
43 Questions?
Survey of commercially available cryptographic chips and IP cores implementing cryptographic algorithms (December 2005)
1 Survey of commercially available cryptographic s and IP cores implementing cryptographic algorithms (December 2005) P. Arora, M. Dugan, P. Gogte, GMU Abstract The objective for this project is to analyze
More informationAES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications
General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (less than 3,000 gates). Enhanced versions
More informationECC1 Core. Elliptic Curve Point Multiply and Verify Core. General Description. Key Features. Applications. Symbol
General Description Key Features Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called elliptic curves and it is a part of the Suite B of cryptographic
More informationLecture 11. Security Protocols. Cryptographic Standards. Companies Developing Cryptographic Hardware
Lecture 11 Security Protocols Cryptographic Standards Companies Developing Cryptographic Hardware Secure Communication Systems (e.g., DMS) Security protocols (e.g., S-MIME, SSL, IPSec) Security mechanisms
More informationFast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays
Kris Gaj and Pawel Chodowiec Electrical and Computer Engineering George Mason University Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable
More informationComparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware
Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware Master s Thesis Pawel Chodowiec MS CpE Candidate, ECE George Mason University Advisor: Dr. Kris Gaj, ECE George
More informationConfiguration of an IPSec VPN Server on RV130 and RV130W
Configuration of an IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote access to corporate resources by establishing an encrypted tunnel
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationScaling Acceleration Capacity from 5 to 50 Gbps and Beyond with Intel QuickAssist Technology
SOLUTION BRIEF Intel QuickAssist Technology Scaling Acceleration Capacity from 5 to 5 Gbps and Beyond with Intel QuickAssist Technology Equipment manufacturers can dial in the right capacity by choosing
More informationNIST Cryptographic Toolkit
Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationSecurity IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y
AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing l e a d i n g t h e w a y l e a d i n g t h e w a y Secure your sensitive content, guarantee its integrity and
More informationOracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table
More informationSymantec Corporation
Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its
More informationeconet smart grid gateways: econet SL and econet MSA FIPS Security Policy
econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,
More informationHughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy
Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network
More informationAnand Raghunathan
ECE 695R: SYSTEM-ON-CHIP DESIGN Module 2: HW/SW Partitioning Lecture 2.26: Example: Hardware Architecture Anand Raghunathan raghunathan@purdue.edu ECE 695R: System-on-Chip Design, Fall 2014 Fall 2014,
More informationECE 646 Fall 2009 Final Exam December 15, Multiple-choice test
ECE 646 Fall 2009 Final Exam December 15, 2009 Multiple-choice test 1. (1 pt) Parallel processing can be used to speed up the following cryptographic transformations (please note that multiple answers
More informationMeru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009
Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety
More informationDell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy
Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its
More informationFast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining
Pawel Chodowiec, Po Khuon, Kris Gaj Electrical and Computer Engineering George Mason University Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining http://ece.gmu.edu/crypto-text.htm
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO.
vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATION iii xii xiv xvii 1 INTRODUCTION 1 1.1 GENERAL 1 1.2 TYPES OF WIRELESS COMMUNICATION
More informationDolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC
Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3
More informationEarly Models in Silicon with SystemC synthesis
Early Models in Silicon with SystemC synthesis Agility Compiler summary C-based design & synthesis for SystemC Pure, standard compliant SystemC/ C++ Most widely used C-synthesis technology Structural SystemC
More information256 Fpga Ip Cores Altera
We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with 256 fpga ip cores altera.
More informationIOS Common Cryptographic Module (IC2M)
IOS Common Cryptographic Module (IC2M) FIPS 140-2 Non Proprietary Security Policy Level 1 Validation Version 0.3 April 18, 2013 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 MODULE VALIDATION
More informationDigital Integrated Circuits
Digital Integrated Circuits Lecture 9 Jaeyong Chung Robust Systems Laboratory Incheon National University DIGITAL DESIGN FLOW Chung EPC6055 2 FPGA vs. ASIC FPGA (A programmable Logic Device) Faster time-to-market
More informationSilent Circle Mobile Application Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174
More informationAn Introduction to Programmable Logic
Outline An Introduction to Programmable Logic 3 November 24 Transistors Logic Gates CPLD Architectures FPGA Architectures Device Considerations Soft Core Processors Design Example Quiz Semiconductors Semiconductor
More informationRoute1 FIPS Cryptographic Module
Route1 FIPS Cryptographic Module Security Policy Version 2.1.0.3 July 10, 2008 Strong encryption technology for software developers Contact Information Route1 Inc., 155 University Avenue, Suite 1920 Toronto,
More informationCisco VPN 3002 Hardware Client Security Policy
Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,
More informationBluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)
Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy
More informationAbout FIPS, NGE, and AnyConnect
About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect
More informationOracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of
More informationHardware Cryptography and z/tpf
z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any
More informationECE 545 Lecture 8b. Hardware Architectures of Secret-Key Block Ciphers and Hash Functions. George Mason University
ECE 545 Lecture 8b Hardware Architectures of Secret-Key Block Ciphers and Hash Functions George Mason University Recommended reading K. Gaj and P. Chodowiec, FPGA and ASIC Implementations of AES, Chapter
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationField Programmable Gate Array (FPGA) Devices
Field Programmable Gate Array (FPGA) Devices 1 Contents Altera FPGAs and CPLDs CPLDs FPGAs with embedded processors ACEX FPGAs Cyclone I,II FPGAs APEX FPGAs Stratix FPGAs Stratix II,III FPGAs Xilinx FPGAs
More informationBCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.
BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May
More informationCrypto Hardware Design for
Crypto Hardware Design for Embedded Applications Dr. Amlan Chakrabarti & Mr. Suman Sau Real Time EmbeddedSystem Research Group A.K.Choudhury School of Information Technology University of Calcutta email:acakcs@caluniv.ac.in
More informationPark Sung Chul. AE MentorGraphics Korea
PGA Design rom Concept to Silicon Park Sung Chul AE MentorGraphics Korea The Challenge of Complex Chip Design ASIC Complex Chip Design ASIC or FPGA? N FPGA Design FPGA Embedded Core? Y FPSoC Design Considerations
More informationECE 448 Lecture 15. Overview of Embedded SoC Systems
ECE 448 Lecture 15 Overview of Embedded SoC Systems ECE 448 FPGA and ASIC Design with VHDL George Mason University Required Reading P. Chu, FPGA Prototyping by VHDL Examples Chapter 8, Overview of Embedded
More informationProtect Yourself Against Security Challenges with Next-Generation Encryption
Protect Yourself Against Security Challenges with Next-Generation Encryption agrieco@cisco.com mcgrew@cisco.com How to detect attacks? Malware Broken encryption 2 How to detect attacks? Malware Host Process
More informationFIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.
FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,
More informationCisco VPN Internal Service Module for Cisco ISR G2
Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services
More informationDell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy
Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA 6600 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 1.3 June 25, 2015 1 Copyright Notice Copyright 2015 Dell Software,
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationThe Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.
The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE
More informationOracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
FIPS 140-2 Non-Proprietary Security Policy Acme Packet 4500 Document Version 2.5 December 5, 2014 Prepared For: Prepared By: Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 www.oracle.com
More informationUpdates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)
Network Working Group P. Hoffman Request for Comments: 4109 VPN Consortium Updates: 2409 May 2005 Category: Standards Track Algorithms for Internet Key Exchange version 1 (IKEv1) Status of This Memo This
More informationHewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0
Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3
More informationAcme Packet 3820 and Acme Packet 4500
FIPS 140-2 Non-Proprietary Security Policy Acme Packet 3820 and Acme Packet 4500 FIPS 140-2 Level 2 Validation Firmware Version ECx 6.4.1 and ECx 6.4.1 M1 Hardware Version A1 August 28, 2015 Copyright
More informationFIPS Non-Proprietary Security Policy
Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely
More informationSatisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017
Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP
More informationFIPS Validation Certificate
FIPS 140- Validation Certificate The National Institute of Standards and Technology of the United States of America The Communications Security Establishment of the Government of Canada Certificate No.
More informationVMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N
More informationRSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication
Security Policy 02.08.12 RSA BSAFE Crypto-J JSAFE and JCE Software Module Security Policy Level 2 Roles, Services and Authentication This document is a non-proprietary security policy for RSA BSAFE Crypto-J
More informationThis version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.
NCP Secure Enterprise MAC Client Service Release 2.02 Build 11 Date: August 2011 1. New Feature Compatibility to Mac OS X 10.7 Lion This version of the des Secure Enterprise MAC Client can be used on Mac
More informationSECURE PARTIAL RECONFIGURATION OF FPGAs. Amir S. Zeineddini Kris Gaj
SECURE PARTIAL RECONFIGURATION OF FPGAs Amir S. Zeineddini Kris Gaj Outline FPGAs Security Our scheme Implementation approach Experimental results Conclusions FPGAs SECURITY SRAM FPGA Security Designer/Vendor
More informationRelease Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.
NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this
More informationFIPS SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes
More informationJuniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.
Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in
More informationCan High-Level Synthesis Compete Against a Hand-Written Code in the Cryptographic Domain? A Case Study
Can High-Level Synthesis Compete Against a Hand-Written Code in the Cryptographic Domain? A Case Study Ekawat Homsirikamol & Kris Gaj George Mason University USA Project supported by NSF Grant #1314540
More informationINTERNET PROTOCOL SECURITY (IPSEC) GUIDE.
INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building
More informationHardware Architectures
Hardware Architectures Secret-key Cryptography Public-key Cryptography Cryptanalysis AES & AES candidates estream candidates Hash Functions SHA-3 Montgomery Multipliers ECC cryptosystems Pairing-based
More informationRSA BSAFE Crypto-C Micro Edition Security Policy
Security Policy 15.11.12 RSA BSAFE Crypto-C Micro Edition 3.0.0.16 Security Policy This document is a non-proprietary security policy for RSA BSAFE Crypto-C Micro Edition 3.0.0.16 (Crypto-C ME) security
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationCoSign Hardware version 7.0 Firmware version 5.2
CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and
More informationSecurity with VA Smalltalk
24 th ESUG Conference Prague, Czech Republic August 23, 2016 Security with VA Smalltalk Seth Berman Vice President of Engineering Instantiations, Inc. Agenda Security Overview Architectural Goals OpenSSL
More informationThis Security Policy describes how this module complies with the eleven sections of the Standard:
Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights
More information!"#$%&'()*+%&,-%&.*/.&0"&#%(1.*"0* 2+345*!%(,',%6.7*87'()*9/:37* :."&).*A%7"(*8('B.&7'6=* 8C2C3C*
!"#$%&'()*+%&,-%&.*/.&0"&#%(1.*"0* 2+345*!%(,',%6.7*87'()*9/:37* ;&
More informationEthernet Switch. WAN Gateway. Figure 1: Switched LAN Example
1 Introduction An Ethernet switch is used to interconnect a number of Ethernet LANs (Local Area Networks), forming a large Ethernet network. Different ports of the switch are connected to different LAN
More informationVPN Overview. VPN Types
VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat
More informationHow to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway
How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway If you are using the Amazon Virtual Private Cloud, you can transparently extend your local network to the cloud by connecting both
More informationSHA Core, Xilinx Edition. Core Facts
SHA Core, Xilinx Edition May 3, 2017 Product Specification Algotronix 130-10 Calton Road Edinburgh, Scotland United Kingdom, EH8 8JQ Phone: +44 131 556 9242 E-mail: cores@algotronix.com URL: www.algotronix.com
More informationNCP Secure Enterprise macos Client Release Notes
Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra
More informationFast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays
Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays Kris Gaj and Pawel Chodowiec George Mason University, Electrical and
More informationBasic FPGA Architectures. Actel FPGAs. PLD Technologies: Antifuse. 3 Digital Systems Implementation Programmable Logic Devices
3 Digital Systems Implementation Programmable Logic Devices Basic FPGA Architectures Why Programmable Logic Devices (PLDs)? Low cost, low risk way of implementing digital circuits as application specific
More informationImprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016
Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents
More informationDolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.
Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3
More informationRelease Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.
NCP Secure Enterprise Mac Client Service Release 2.05 Rev. 32317 Date: January 2017 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this
More informationRSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services
Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE
More informationRSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services
Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE
More informationPrepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677
Non-Proprietary Security Policy for the FIPS 140-2 Level 2 Validated AirFortress Wireless Security Gateway Hardware Model AF7500 (Document Version 2.3) March 2007 Prepared by the Fortress Technologies,
More information1GbEth. Access Switch. 1GbEth. Workgroup Switch. 10MbEth. Figure 1: Enterprise LAN Topology Example
1 Introduction Ethernet is available in different speeds (10 and 100Mbps) and provides connectivity to meet a wide range of needs and from desktop to switches. MorethanIP IP solutions provide a solution
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationComparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef
Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Outline Introduction Approach Research Results Conclusion
More informationECE 111 ECE 111. Advanced Digital Design. Advanced Digital Design Winter, Sujit Dey. Sujit Dey. ECE Department UC San Diego
Advanced Digital Winter, 2009 ECE Department UC San Diego dey@ece.ucsd.edu http://esdat.ucsd.edu Winter 2009 Advanced Digital Objective: of a hardware-software embedded system using advanced design methodologies
More informationSymantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy
Symantec Corporation Symantec Cryptographic Module Software Version: 1.1 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.6 Prepared for: Prepared by: Symantec Corporation
More informationFIPS SECURITY POLICY
FIPS 140-2 SECURITY POLICY Juniper Networks SSG-520(M) and SSG-550(M) HW P/N SSG-520, SSG-520M and SSG-550, SSG-550M Version 0000, FW Version ScreenOS 5.4.0r4 Document # 530-020766-01 Juniper SSG-520 and
More informationData Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology
Universal VPN Client Suite for macos/os X Compatible with VPN Gateways (IPsec Standard) macos 10.13, 10.12, OS X 10.11, OS X 10.10 Import of third party configuration files Integrated, dynamic Personal
More informationFIPS SECURITY POLICY
FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 520M and SSG 550M HW P/N SSG-520M-SH, SSG-520M-SH-N, SSG-520M-SH-DC-N, SSG-520M-N-TAA, SSG-520M-SH-DC-N- TAA, SSG-550M-SH, SSG-550M-SH-N, SSG-550M-SH-DC-N,
More informationEvolution of CAD Tools & Verilog HDL Definition
Evolution of CAD Tools & Verilog HDL Definition K.Sivasankaran Assistant Professor (Senior) VLSI Division School of Electronics Engineering VIT University Outline Evolution of CAD Different CAD Tools for
More informationFIPS SECURITY POLICY
FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 5 and SSG 20 HW P/N SSG-5 and SSG-20, FW Version ScreenOS 6.3.0r6 Copyright Notice Copyright 2011 Juniper Networks, Inc. May be reproduced only in
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More informationUse of Embedded FPGA Resources in Implementa:ons of 14 Round 2 SHA- 3 Candidates
Use of Embedded FPGA Resources in Implementa:ons of 14 Round 2 SHA- 3 Candidates Kris Gaj, Rabia Shahid, Malik Umar Sharif, and Marcin Rogawski George Mason University U.S.A. Co-Authors Rabia Shahid Malik
More information1GbEth. Access Switch. Workgroup Switch. 10MbEth. Figure 1: Enterprise LAN Topology Example
1 Introduction Ethernet is available in different speeds (10/100/1000 and 10000Mbps) and provides connectivity to meet a wide range of needs from desktop to switches. MorethanIP IP solutions provide a
More informationFIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0.
FIPS 140-2 Non-Proprietary Security Policy Acme Packet 4600 FIPS 140-2 Level 2 Validation Hardware Version: 4600 Firmware Version: E-CZ8.0.0 Date: July 20 th, 2018 Title: Acme Packet 4600 Security Policy
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More information