POWER7+ Accelerated Encryption and Random Number Generation for Linux
|
|
- Derrick Harrell
- 6 years ago
- Views:
Transcription
1 POWER7+ Accelerated Encryption and Random Number Generation for Linux Kent Yoder IBM Linux Technology Center February 22, 2013 Contents 1 Introduction 2 2 Hardware Architecture Encryption Random Bit Generation Software Architecture 2 4 Setting Up Your Linux System Encryption and Hashing RNG Monitoring Use of the Accelerators 5 6 Applications Disk Encryption dm-crypt with LUKS ecryptfs IPSec StrongSwan Trademarks 7 1
2 1 Introduction One of the new features included in the IBM R POWER7+ TM CPU is a set of co-processors providing high speed encryption and random number generation (RNG). Support for these new hardware features is now available in Fedora Linux and will continue to be integrated into other community Linux distributions. This white paper walks you through the hardware and software architecture for the co-processors, discusses their setup on a Fedora 18 system, and explains how you can best take advantage of them in various Linux applications. 2 Hardware Architecture 2.1 Encryption The encryption and RNG accelerators are physically resident in each POWER7+ CPU. All CPU cores in a chip share access to their own accelerator units. Each accelerator unit contains 3 processors responsible for Advanced Encryption Standard (AES) encryption and Secure Hash Algorithm (SHA) hashing. The hardware contains 16 I/O queues to handle incoming and outgoing requests, which are controlled exclusively by the PowerVM R hypervisor. 2.2 Random Bit Generation Hardware random numbers are delivered 64 bits at a time into an 8-entry buffer also managed by the PowerVM hypervisor. Each bit is independently generated using 64 ring-oscillators designed to run at their own frequencies. 3 Software Architecture Support for the accelerators is implemented in the Linux kernel s crypto API, where requests for encryption are passed through hypervisor calls to PowerVM. PowerVM is then responsible for queuing and submitting requests from all logical partitions to the hardware. The accelerators support the following modes for AES: Galois Counter Mode (GCM) Counter Mode (CTR) Figure 1: Software architecture 2
3 Cipher Block Chaining Mode (CBC) Electronic Code Book Mode (ECB) They support the following hash algorithms: SHA-256 SHA-512 They also support one keyed MAC: AES-XCBC-MAC 4 Setting Up Your Linux System Support for the POWER7+ accelerators is now included in Fedora 17 and 18 and may be included in other distributions after the time of this writing. Any Linux distribution that supports the POWER R architecture and includes a kernel version 3.5 or newer running on PowerVM should be able to make use of the accelerators. You can query your kernel version with the uname command (shown here on a Fedora 18 system). $ uname -r fc18.ppc64p7 4.1 Encryption and Hashing The Linux driver supporting the accelerators is called nx-crypto and can be loaded using the modprobe command. # modprobe nx-crypto Once the driver is loaded, you can see a list of its supported algorithms in /proc/crypto. Algorithms whose driver property has the -nx suffix will be accelerated by the POWER7+ CPU. Here s a sample algorithm listed in the output of the command cat /proc/crypto. name : cbc(aes) driver : cbc-aes-nx module : nx_crypto priority : 300 refcnt : 1 selftest : passed type : blkcipher blocksize : 16 min keysize : 16 max keysize : 32 ivsize : 16 geniv : <default> 3
4 An explanation of these fields: name: The algorithm and mode written as mode(alg). driver: An indication of the driver implementing the algorithm. The -nx suffix indicates that its implemented by the nx-crypto driver. module: The kernel module for the algorithm s driver. priority: The priority for use of the algorithm. When multiple modules provide an implementation of the same algorithm, the highest priority module is tried first. refcnt: A count of the users of this algorithm. In the case of encrypted file systems like ecryptfs, this count is incremented whenever a new file is opened, so the count can be very large. selftest: An indication of the status of the automatic self test that runs before an algorithm is used. type: The type of algorithm, such as block cipher, hash, and so forth. shash indicates a synchronous hash operation. All algorithms accelerated by the POWER7+ CPU are implemented as synchronous operations. blocksize: The number of bytes encrypted or hashed at a time for an algorithm. min keysize: The minimum key size in bytes for the algorithm. max keysize: The maximum key size in bytes for the algorithm. ivsize: The size in bytes of an initial vector for the algorithm. geniv: The method for initial vector (IV) generation. Some algorithm modes use specific methods to generate their IVs all others will be marked as <default>. 4.2 RNG The pseries-rng module is the driver for the random number generator. Once loaded, the driver creates /dev/hwrng, which provides a read-only interface to the device. By default, most applications will be written to pull random numbers from /dev/urandom on a Linux system. /dev/urandom is a non-blocking source of randomness and is seeded using entropy gathered inside the Linux kernel using sources such as keyboard activity, interrupt activity, and other device activity. On IBM Power Systems TM servers, most logical partitions are installed without direct connections to mice or keyboards. Therefore their opportunities to gather entropy from devices are small. To overcome this issue, we can use rngd to pull entropy from the POWER7+ CPU and use it to seed /dev/urandom. In Fedora, rngd is included in the rng-tools package. Once it is installed, you can use systemctl to enable and activate the service. 4
5 # systemctl enable rngd.service # systemctl start rngd.service The rngd service continually reads entropy from the POWER7+ CPU through /dev/hwrng and write it out to /dev/random, which seeds the /dev/urandom entropy pool. As applications drain random bytes from /dev/urandom, it is continually reseeded with entropy from the POWER7+ CPU. 5 Monitoring Use of the Accelerators debugfs support is included in the nx-crypto driver, which allows for real-time monitoring of the use of the accelerators. After the nx-crypto driver is loaded, mount debugfs. # mount -t debugfs debugfs /sys/kernel/debug After debugfs is mounted, several special are exposed under /sys/kernel/debug/nx-crypto/. These files include: aes bytes: The number of bytes encrypted and decrypted by all modes of AES. aes ops: The number of requests sent to the accelerator for encryption or decryption in all modes of AES. errors: The total number of errors returned by the hypervisor that could not be mitigated by the driver. An example of an error mitigated by the driver is a retry of the operation if H BUSY is returned. last error: The last error returned by the hypervisor that could not be mitigated by the driver in response to a request sent by last error pid. last error pid: The process ID of the application that received last error. sha256 bytes: The number of bytes hashed using SHA-256. sha256 ops: The number of SHA-256 requests sent to the accelerator. sha512 bytes: The number of bytes hashed using SHA-512. sha512 ops: The number of SHA-512 requests sent to the accelerator. As mentioned previously, last error contains the error value returned by the hypervisor only when that error cannot be mitigated by the kernel. The most common errors returned are: H BUSY (1): The hardware is busy, try again later H RESOURCE ( ): Insufficient hypervisor resources to perform the operation H NOT ENOUGH RESOURCES ( ): Hypervisor memory is exhausted When any of these errors are encountered, the driver re-submits the request to the hypervisor. Only after 10 retries does the driver give up and log the error into last error. 5
6 6 Applications 6.1 Disk Encryption dm-crypt with LUKS One method of encrypting storage on a Linux system is to leverage the device mapper for encrypting a logical volume. dm-crypt is the device mapper kernel module to use, and keys for the volume are managed with the cryptsetup utility. cryptsetup manages the Linux Unified Key Setup (LUKS) header for your encrypted volume. After the nx-crypto driver is loaded, the only requirement for enabling acceleration of dm-crypt is to be sure that you are using the AES-CBC algorithm on your logical volume. To see the default cipher setting, use cryptsetup. $ cryptsetup --help tail -4 Default compiled-in device cipher parameters: loop-aes: aes, Key 256 bits plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: ripemd160 LUKS1: aes-cbc-essiv:sha256, Key: 256 bits, LUKS header hashing: sha1, RNG: /dev/urandom As encrypted files are read and written, you should be able to see the values for /sys/kernel/debug/nx-crypto/aes ops and /sys/kernel/debug/nx-crypto/aes bytes increase ecryptfs ecryptfs is a Virtual File System (VFS) layer encrypted file system included with most Linux distributions. Due to the large 4K encrypt and decrypt operations it uses when reading and writing data to disk, it is a good candidate to benefit from the POWER7+ accelerators. After the nx-crypto driver is loaded, the only requirement for enabling acceleration of ecryptfs is to be sure that you are using the AES algorithm on your ecryptfs mount point. This is indicated by the ecryptfs cipher=aes mount option. # mount grep ecryptfs cipher /mnt/lower on /mnt/upper type ecryptfs (rw,...,ecryptfs cipher=aes,...) As encrypted files and read and written, you should be able to see the values for /sys/kernel/debug/nx-crypto/aes ops and /sys/kernel/debug/nx-crypto/aes bytes increase. 6.2 IPSec Several of the AES modes accelerated by the POWER7+ CPU are specifically made for use with IPSec. Setup is as simple as configuring your IPSec implementation to use one of these modes StrongSwan To configure StrongSwan so that its IKE and ESP encryption is offloaded to the POWER7+ accelerators, use these options in /etc/strongswan/ipsec.conf: 6
7 ikev2= OR esp= POWER7+ algorithm Key Size aes128 AES-CBC 128 aes192 AES-CBC 192 aes256 AES-CBC 256 aes128ctr AES-CTR 128 aes192ctr AES-CTR 192 aes256ctr AES-CTR 256 aes128gcm8 AES-GCM 128 aes128gcm12 AES-GCM 128 aes128gcm16 AES-GCM 128 aes192gcm8 AES-GCM 192 aes192gcm12 AES-GCM 192 aes192gcm16 AES-GCM 192 aes256gcm8 AES-GCM 256 aes256gcm12 AES-GCM 256 aes256gcm16 AES-GCM 256 Table 1: StrongSwan cipher modes For more detailed information about configuring StrongSwan ciphers, see 7 Trademarks IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at Linux is a trademark of Linus Torvalds in the United States, other countries, or both. 7
Secure Storage with Encrypted file systems
2018/02/18 01:06 1/10 Secure Storage with Encrypted file systems Secure Storage with Encrypted file systems Encryption is done through dm-crypt using LUKS as the key setup using kernel crypto API. Linux
More informationDisk-Level Encryption
2011-2017 Percona, Inc. 1 / 19 Disk-Level Encryption http://www.percona.com/training/ 2011-2017 Percona, Inc. 2 / 19 Introduction Clients in the PCI, HIPPA, or PHI space Encrypted "at rest" MySQL 5.7 InnoDB
More informationLinux Kernel Cryptographic API for fun and profit
Linux Kernel Cryptographic API for fun and profit Gilad Ben-Yossef Gilad Ben-Yossef gilad.benyossef@arm.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography
More informationDisk-Level Encryption
2011-2017 Percona, Inc. 1 / 25 Disk-Level Encryption http://www.percona.com/training/ 2011-2017 Percona, Inc. 2 / 25 Disk-Level Encryption OVERVIEW 2011-2017 Percona, Inc. 3 / 25 Introduction Security,
More informationOracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of
More informationThe Linux Kernel Cryptographic API
Published on Linux Journal (http://www.linuxjournal.com) The Linux Kernel Cryptographic API By James Morris Created 2003-04-01 02:00 This article provides a brief overview of the new cryptographic API
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationIPSec Transform Set Configuration Mode Commands
IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and
More informationSymantec Corporation
Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its
More informationIPSec Transform Set Configuration Mode Commands
IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and
More informationHow to abstract hardware acceleration device in cloud environment. Maciej Grochowski Intel DCG Ireland
How to abstract hardware acceleration device in cloud environment Maciej Grochowski Intel DCG Ireland Outline Introduction to Hardware Accelerators Intel QuickAssist Technology (Intel QAT) as example of
More informationWriting drivers for the Linux Crypto subsystem
May 18, 2014 Marek Vasut Software engineer at DENX S.E. since 2011 Embedded and Real-Time Systems Services, Linux kernel and driver development, U-Boot development, consulting, training. Versatile Linux
More informationSymmetric Encryption. Thierry Sans
Symmetric Encryption Thierry Sans Design principles (reminder) 1. Kerkoff Principle The security of a cryptosystem must not rely on keeping the algorithm secret 2. Diffusion Mixing-up symbols 3. Confusion
More informationAnand Raghunathan
ECE 695R: SYSTEM-ON-CHIP DESIGN Module 2: HW/SW Partitioning Lecture 2.26: Example: Hardware Architecture Anand Raghunathan raghunathan@purdue.edu ECE 695R: System-on-Chip Design, Fall 2014 Fall 2014,
More informationOracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table
More informationStorage encryption... what about data integrity?
Centre for Research on Cryptography and Security Storage encryption... what about data integrity? Milan Brož mbroz@redhat.com DevConf, Brno January 28, 2017 Agenda Data integrity what it is? Encryption
More informationSEC 2/3x Descriptor Programmer s Guide
Freescale Semiconductor Application Note Document Number: AN3645 Rev. 3, 04/2010 SEC 2/3x Descriptor Programmer s Guide by Networking and Multimedia Group Freescale Semiconductor, Inc This application
More informationVPN Overview. VPN Types
VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationSecure Key Management and Data Privacy on z/tpf
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 Secure Key Management and Data Privacy on z/tpf Name : Mark Gambino
More informationCredant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation
Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS 140-2 Non-Proprietary Security Policy, Version 1.7 Level 1 Validation October 2007 1. INTRODUCTION 3 2. PRODUCT, BOUNDARY,
More informationLinux on System z - Disk I/O Alternatives
Mustafa Mesanovic 3/21/11 Linux on System z - Disk I/O Alternatives visit us at http://www.ibm.com/developerworks/linux/linux390/perf/index.html Linux on System z Performance Evaluation Trademarks IBM,
More informationECE 646 Lecture 8. Modes of operation of block ciphers
ECE 646 Lecture 8 Modes of operation of block ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5 th and 6 th Edition, Chapter 6 Block Cipher Operation II. A. Menezes, P.
More informationSymmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.
Symmetric Key Encryption Symmetric Key Encryption and 3- Tom Chothia Computer Security: Lecture 2 Padding Block cipher modes Advanced Encryption Standard ( AES ) AES is a state-of-the-art block cipher.
More informationPerformance Evaluation of Software Routers with VPN Features
74 Telfor Journal, Vol. 9, No. 2, 2017. Performance Evaluation of Software s with VPN Features Hasan Redžović, Graduate Student Member, IEEE, Aleksandra Smiljanić, Member, IEEE, and Bogdan Savić Abstract
More informationSecurity features for UBIFS. Richard Weinberger sigma star gmbh
Richard Weinberger sigma star gmbh /me Richard Weinberger Co-founder of sigma star gmbh Linux kernel developer and maintainer Strong focus on Linux kernel, lowlevel components, virtualization, security
More informationLinux Random Number Generator A New Approach
Linux Random Number Generator A New Approach Stephan Müller September 17, 2017 Abstract The venerable Linux /dev/random served users of cryptographic mechanisms well for a long time.
More informationSSH Algorithms for Common Criteria Certification
The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and
More informationIntroduction to Linux features for disk I/O
Martin Kammerer 3/22/11 Introduction to Linux features for disk I/O visit us at http://www.ibm.com/developerworks/linux/linux390/perf/index.html Linux on System z Performance Evaluation Considerations
More informationHardware Cryptography and z/tpf
z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any
More informationEnd-to-End Encryption of Data-at-Rest for Linux on IBM Z and LinuxONE
End-to-End Encryption of Data-at-Rest for Linux on IBM Z and LinuxONE Reinhard Buendgen -- buendgen@de.ibm.com Product Owner Security for Linux on Z IBM Z / ZSP03160-USEN-38 / July 17, 2017 / 2017 IBM
More informationBlock Cipher Modes of Operation
Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book
More informationAuthenticated Encryption
18733: Applied Cryptography Anupam Datta (CMU) Authenticated Encryption Online Cryptography Course Authenticated Encryption Active attacks on CPA-secure encryption Recap: the story so far Confidentiality:
More informationThere are numerous Python packages for cryptography. The most widespread is maybe pycrypto, which is however unmaintained since 2015, and has
1 There are numerous Python packages for cryptography. The most widespread is maybe pycrypto, which is however unmaintained since 2015, and has unpatched buffer-overflow vulnerabilities. New projects should
More informationFIPS Security Policy UGS Teamcenter Cryptographic Module
FIPS 140-2 Security Policy UGS Teamcenter Cryptographic Module UGS Corp 5800 Granite Parkway, Suite 600 Plano, TX 75024 USA May 18, 2007 Version 1.3 containing OpenSSL library source code This product
More informationCrypto Device Drivers. Release
Crypto Device Drivers Release 16.11.3 August 30, 2017 CONTENTS 1 Crypto Device Supported Functionality Matrices 1 2 AESN-NI Multi Buffer Crytpo Poll Mode Driver 3 2.1 Features........................................
More informationThe Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.
The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE
More informationLecture 4: Hashes and Message Digests,
T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary
More informationz/tpfdf Encryption Communications Subcommittee! IBM z/tpf April 11, 2016! Chris Filachek z/tpf and z/tpfdf Architecture & Development!
z/tpfdf Encryption Communications Subcommittee! Chris Filachek z/tpf and z/tpfdf Architecture & Development! IBM z/tpf April 11, 2016! Copyright IBM Corporation 2016. U.S. Government Users Restricted Rights
More informationUsing Hardware Crypto Support in Linux on System z
Using Hardware Crypto Support in Linux on System z Dr. Reinhard Buendgen (buendgen@de.ibm.com) IBM Deutschland Research & Development March 15, 2012 Session 11076 Trademarks The following are trademarks
More informationEMC VNX Series: Introduction to SMB 3.0 Support
White Paper EMC VNX Series: Introduction to SMB 3.0 Support Abstract This white paper introduces the Server Message Block (SMB) 3.0 support available on the EMC VNX and the advantages gained over the previous
More informationConfessions of a security hardware driver maintainer
Confessions of a security hardware driver maintainer Gilad Ben-Yossef Principal Software Engineer About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography and security in genera,l
More informationPerformance Enhancement for IPsec Processing on Multi-Core Systems
Performance Enhancement for IPsec Processing on Multi-Core Systems Sandeep Malik Freescale Semiconductor India Pvt. Ltd IDC Noida, India Ravi Malhotra Freescale Semiconductor India Pvt. Ltd IDC Noida,
More informationBlock Cipher Modes of Operation
Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 24th March 2016 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book
More informationM2351 Security Architecture. TrustZone Technology for Armv8-M Architecture
Architecture TrustZone Technology for Armv8-M Architecture Outline NuMicro Architecture TrustZone for Armv8-M Processor Core, Interrupt Handling, Memory Partitioning, State Transitions. TrustZone Implementation
More informationSecurity IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y
AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing l e a d i n g t h e w a y l e a d i n g t h e w a y Secure your sensitive content, guarantee its integrity and
More informationChapter 18: wolfcrypt API Reference
Chapter 18: wolfcrypt API Reference Table of Contents March, 2016 Version 3.9.0 18.1 AES 18.2 Arc4 18.3 ASN 18.4 Blake2 18.5 Camellia 18.6 ChaCha 18.7 ChaCha20 with Poly1305 18.8 Coding 18.9 Compression
More informationIKEv2-SCSI (06-449) Update
1 IKEv2-SCSI (06-449) Update David L. Black 2 IKEv2-SCSI (06-449) Plans and Status Plan Revise IKEv2-SCSI draft for approval at this meeting Reality The best laid schemes o' Mice an' Men... gang aft FCoE!!
More informationYour Roadmap to POWER9: Migration Scenarios
Your Roadmap to POWER9: Migration Scenarios IBM POWER9 Making the investment to upgrade your systems ensures you have the most reliable foundational infrastructure for your daily operations. IBM Power
More informationLecture 6: Symmetric Cryptography. CS 5430 February 21, 2018
Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.
More informationSecure storage in OP-TEE. Jens Wiklander
Secure storage in OP-TEE Jens Wiklander ENGINEERS AND DEVICES WORKING TOGETHER Agenda What is secure storage? Timeline - secure storage improvements Encryption keys Secure Object Hash tree Hash tree header
More informationIPSec Site-to-Site VPN (SVTI)
13 CHAPTER Resource Summary for IPSec VPN IKE Crypto Key Ring Resource IKE Keyring Collection Resource IKE Policy Resource IKE Policy Collection Resource IPSec Policy Resource IPSec Policy Collection Resource
More informationAuthenticated Encryption
18733: Applied Cryptography Anupam Datta (CMU) Authenticated Encryption Online Cryptography Course Authenticated Encryption Active attacks on CPA-secure encryption Recap: the story so far Confidentiality:
More informationIBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S)
IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S) 1 Copyright IBM Corporation 1994, 2015. IBM Corporation Marketing Communications, Server Group Route 100 Somers, NY
More informationInline LOBs (Large Objects)
Inline LOBs (Large Objects) Jeffrey Berger Senior Software Engineer DB2 Performance Evaluation bergerja@us.ibm.com Disclaimer/Trademarks THE INFORMATION CONTAINED IN THIS DOCUMENT HAS NOT BEEN SUBMITTED
More informationOpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications.
1 OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications. The toolkit offers a series of command-line tools to perform
More informationAnalyzing the Generation and Optimization of an FPGA Accelerator using High Level Synthesis
Paper Analyzing the Generation and Optimization of an FPGA Accelerator using High Level Synthesis Sebastian Kaltenstadler Ulm University Ulm, Germany sebastian.kaltenstadler@missinglinkelectronics.com
More informationCrypto: Passwords and RNGs. CS 642 Guest Lecturer: Adam Everspaugh
Crypto: Passwords and RNGs CS 642 Guest Lecturer: Adam Everspaugh http://pages.cs.wisc.edu/~ace Topics! Password-based Crypto!! Random Number Generators Symmetric Key Encryption key generation R k Gen
More informationJuniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.
Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in
More informationProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy
ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood
More informationryptograi "ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project
for ryptograi "ГС V6 е Tom St Denis, Elliptic Semiconductor Inc. and Author of the LibTom Project Simon Johnson Contents Preface Chapter 1 Introduction 1 Introduction 2 Threat Models 3 What Is Cryptography?
More informationIntroducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine
Introducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine Alexis Alcott, Product Marketing Manager, MCU16 Division June 24, 2014 2 Announcing at Sensors Expo PIC24F GB2 MCUs
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this
More informationBlueprints. Protecting your data at rest with Red Hat Enterprise Linux on System x
Blueprints Protecting your data at rest with Red Hat Enterprise Linux on System x Blueprints Protecting your data at rest with Red Hat Enterprise Linux on System x Note Before using this information and
More informationSP Reviewing The Standard. Stephan Müller atsec information security GmbH
SP800-90 Reviewing The Standard Stephan Müller atsec information security GmbH Email: smueller@atsec.com 13 ICMC 2013, September 24-26, Gaithersburg, MD 13 Agenda Practical aspects of implementing SP800-90A
More informationApple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy
Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_OSX_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple
More informationPervasive Encryption for Linux on z Systems and LinuxONE
Pervasive Encryption for Linux on z Systems and LinuxONE Reinhard Buendgen -- buendgen@de.ibm.com Crypto Architect for Linux on z IBM Z / ZSP03160-USEN-38 / July 17, 2017 / 2017 IBM Corporation Trademarks
More informationINSE 6110 Midterm LAST NAME FIRST NAME. Fall 2016 Duration: 80 minutes ID NUMBER. QUESTION Total GRADE. Notes:
A INSE 6110 Midterm Fall 2016 Duration: 80 minutes LAST NAME FIRST NAME ID NUMBER QUESTION 1 2 3 4 Total GRADE Notes: 1) Calculator (non-programming) allowed, nothing else permitted 2) Each page contains
More informationEnhance your Cloud Security with AMD EPYC Hardware Memory Encryption
Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital
More informationFIPS Security Policy
Motorola Mobility Linux Kernel Software Cryptographic Module FIPS 140-2 Security Policy Module Version 1.0 Document version 1.13 March 11, 2015 This document may be freely copied and distributed provided
More informationCrypto Device Drivers. Release
Crypto Device Drivers Release 17.02.1 June 02, 2017 CONTENTS 1 Crypto Device Supported Functionality Matrices 1 2 AESN-NI Multi Buffer Crytpo Poll Mode Driver 3 2.1 Features........................................
More informationProtecting your system from the scum of the universe
Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream
More informationAttacking the Linux PRNG on Android. David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems
Attacking the Linux PRNG on Android David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems MOTIVATION motivation_keystore_buffer_overflow We discovered CVE-2014-3100, a stack-based Buffer
More informationLecture 3: Symmetric Key Encryption
Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07
More informationNCP Secure Enterprise macos Client Release Notes
Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra
More informationEgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy
EgoSecure GmbH EgoSecure Full Disk Encryption (FDE) Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.5 06/12/2014 Copyright EgoSecure GmbH, 2014. May be reproduced only
More informationThe Rectangle Attack
The Rectangle Attack and Other Techniques for Cryptanalysis of Block Ciphers Orr Dunkelman Computer Science Dept. Technion joint work with Eli Biham and Nathan Keller Topics Block Ciphers Cryptanalysis
More informationNCP Secure Entry macos Client Release Notes
Service Release: 3.20 r43098 Date: March 2019 Prerequisites Apple macos operating systems: The following Apple macos operating systems are supported with this release: macos Mojave 10.14 macos High Sierra
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationThe Pervasive Encryption Imperative. IBM Competitive Project Office Mark Moore Senior Software Engineer
The Pervasive Encryption Imperative IBM Competitive Project Office Mark Moore Senior Software Engineer June 2017 Contents Introduction... 3 Pervasive encryption to address a pervasive threat... 3 Starting
More informationFIPS Level 1 Validation March 31, 2011 Version 1.12
KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library Version 3.0 Security Policy FIPS 140-2 Level 1 Validation March 31, 2011 Version 1.12 Table of Contents 1 Introduction... 1 1.1 Acronyms and
More informationSecuring Network Traffic Tunneled Over Kernel managed TCP/UDP sockets
Securing Network Traffic Tunneled Over Kernel managed TCP/UDP sockets Sowmini Varadhan(sowmini.varadhan@oracle.com) Agenda Proceedings of NetDev 1.1: The Technical Conference on Linux Networking (February
More informationCSC 580 Cryptography and Computer Security
CSC 580 Cryptography and Computer Security Random Bit Generators (Sections 8.1-8.3) February 20, 2018 Overview Today: HW 4 solution discussion Pseudorandom generation - concepts and simple techniques Reminder:
More informationVirtual Private Networks (VPN)
CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1
More informationProtecting your system from the scum of the universe
Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream
More informationAccelerated Library Framework for Hybrid-x86
Software Development Kit for Multicore Acceleration Version 3.0 Accelerated Library Framework for Hybrid-x86 Programmer s Guide and API Reference Version 1.0 DRAFT SC33-8406-00 Software Development Kit
More informationParallelizing IPsec: switching SMP to On is not even half the way
Parallelizing IPsec: switching SMP to On is not even half the way Steffen Klassert secunet Security Networks AG Dresden June 11 2010 Table of contents Some basics about IPsec About the IPsec performance
More information1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9
Apple Inc. Apple ios CoreCrypto Kernel Module, v3.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.03 Version 01.03 April, 2013 Prepared for: Apple
More informationDatapath. Encryption
Datapath The following refers to the IKE/IPsec datapath implementation of overlay tunnels between Silver Peak devices. VXOA Release 7.3 (Regular "IPsec" mode with IKE) 8.0 (Regular "IPsec" mode with IKE)
More informationSecure Networking with NAT Traversal for Enhanced Mobility
Secure Networking with NAT Traversal for Enhanced Mobility Lubomir Cvrk 1, Vit Vrba 1 1 Brno University of Technology, Dept. of Telecommunications, Purkynova 118, 61200 Brno, Czech Republic {cvrk, vrba}@westcom.cz
More informationBlock Cipher Operation. CS 6313 Fall ASU
Chapter 7 Block Cipher Operation 1 Outline q Multiple Encryption and Triple DES q Electronic Codebook q Cipher Block Chaining Mode q Cipher Feedback Mode q Output Feedback Mode q Counter Mode q XTS-AES
More informationCryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 12 Message Authentication Codes At cats' green on the Sunday he took the message from
More informationEnabling DM_Crypt Functionality in SDK release 5.07
Enabling DM_Crypt Functionality in SDK release 5.07 This document lists steps to enable DM_Crypt functionality in SDK 05.07 Note: This document is intended for use with SDK release 5.07 and Ubuntu 10.04LTS.
More informationBluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)
Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy
More informationOverview of cryptography and enhancements on z/vse 4.3
Overview of cryptography and enhancements on z/vse 4.3 Joerg Schmidbauer jschmidb@de.ibm.com March, 2011 Trademarks Trademarks The following are trademarks of the International Business Machines Corporation
More informationINTERNET PROTOCOL SECURITY (IPSEC) GUIDE.
INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building
More informationVMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N
More informationSecurity Policy for FIPS KVL 3000 Plus
Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...
More informationLinux system monitoring
Linux system monitoring Martin Kammerer 06/14/2010 visit us at http://www.ibm.com/developerworks/linux/linux390/perf/index.html Page 1 of 14 Linux system monitoring 2010 IBM Corporation Table of Contents
More informationSecurity Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)
Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Cryptographic module used in Motorola Solutions Astro XTL5000, XTS5000, APX2000, SRX2200, APX4000, APX6000, APX6000XE, APX6500,
More information