POWER7+ Accelerated Encryption and Random Number Generation for Linux

Size: px
Start display at page:

Download "POWER7+ Accelerated Encryption and Random Number Generation for Linux"

Transcription

1 POWER7+ Accelerated Encryption and Random Number Generation for Linux Kent Yoder IBM Linux Technology Center February 22, 2013 Contents 1 Introduction 2 2 Hardware Architecture Encryption Random Bit Generation Software Architecture 2 4 Setting Up Your Linux System Encryption and Hashing RNG Monitoring Use of the Accelerators 5 6 Applications Disk Encryption dm-crypt with LUKS ecryptfs IPSec StrongSwan Trademarks 7 1

2 1 Introduction One of the new features included in the IBM R POWER7+ TM CPU is a set of co-processors providing high speed encryption and random number generation (RNG). Support for these new hardware features is now available in Fedora Linux and will continue to be integrated into other community Linux distributions. This white paper walks you through the hardware and software architecture for the co-processors, discusses their setup on a Fedora 18 system, and explains how you can best take advantage of them in various Linux applications. 2 Hardware Architecture 2.1 Encryption The encryption and RNG accelerators are physically resident in each POWER7+ CPU. All CPU cores in a chip share access to their own accelerator units. Each accelerator unit contains 3 processors responsible for Advanced Encryption Standard (AES) encryption and Secure Hash Algorithm (SHA) hashing. The hardware contains 16 I/O queues to handle incoming and outgoing requests, which are controlled exclusively by the PowerVM R hypervisor. 2.2 Random Bit Generation Hardware random numbers are delivered 64 bits at a time into an 8-entry buffer also managed by the PowerVM hypervisor. Each bit is independently generated using 64 ring-oscillators designed to run at their own frequencies. 3 Software Architecture Support for the accelerators is implemented in the Linux kernel s crypto API, where requests for encryption are passed through hypervisor calls to PowerVM. PowerVM is then responsible for queuing and submitting requests from all logical partitions to the hardware. The accelerators support the following modes for AES: Galois Counter Mode (GCM) Counter Mode (CTR) Figure 1: Software architecture 2

3 Cipher Block Chaining Mode (CBC) Electronic Code Book Mode (ECB) They support the following hash algorithms: SHA-256 SHA-512 They also support one keyed MAC: AES-XCBC-MAC 4 Setting Up Your Linux System Support for the POWER7+ accelerators is now included in Fedora 17 and 18 and may be included in other distributions after the time of this writing. Any Linux distribution that supports the POWER R architecture and includes a kernel version 3.5 or newer running on PowerVM should be able to make use of the accelerators. You can query your kernel version with the uname command (shown here on a Fedora 18 system). $ uname -r fc18.ppc64p7 4.1 Encryption and Hashing The Linux driver supporting the accelerators is called nx-crypto and can be loaded using the modprobe command. # modprobe nx-crypto Once the driver is loaded, you can see a list of its supported algorithms in /proc/crypto. Algorithms whose driver property has the -nx suffix will be accelerated by the POWER7+ CPU. Here s a sample algorithm listed in the output of the command cat /proc/crypto. name : cbc(aes) driver : cbc-aes-nx module : nx_crypto priority : 300 refcnt : 1 selftest : passed type : blkcipher blocksize : 16 min keysize : 16 max keysize : 32 ivsize : 16 geniv : <default> 3

4 An explanation of these fields: name: The algorithm and mode written as mode(alg). driver: An indication of the driver implementing the algorithm. The -nx suffix indicates that its implemented by the nx-crypto driver. module: The kernel module for the algorithm s driver. priority: The priority for use of the algorithm. When multiple modules provide an implementation of the same algorithm, the highest priority module is tried first. refcnt: A count of the users of this algorithm. In the case of encrypted file systems like ecryptfs, this count is incremented whenever a new file is opened, so the count can be very large. selftest: An indication of the status of the automatic self test that runs before an algorithm is used. type: The type of algorithm, such as block cipher, hash, and so forth. shash indicates a synchronous hash operation. All algorithms accelerated by the POWER7+ CPU are implemented as synchronous operations. blocksize: The number of bytes encrypted or hashed at a time for an algorithm. min keysize: The minimum key size in bytes for the algorithm. max keysize: The maximum key size in bytes for the algorithm. ivsize: The size in bytes of an initial vector for the algorithm. geniv: The method for initial vector (IV) generation. Some algorithm modes use specific methods to generate their IVs all others will be marked as <default>. 4.2 RNG The pseries-rng module is the driver for the random number generator. Once loaded, the driver creates /dev/hwrng, which provides a read-only interface to the device. By default, most applications will be written to pull random numbers from /dev/urandom on a Linux system. /dev/urandom is a non-blocking source of randomness and is seeded using entropy gathered inside the Linux kernel using sources such as keyboard activity, interrupt activity, and other device activity. On IBM Power Systems TM servers, most logical partitions are installed without direct connections to mice or keyboards. Therefore their opportunities to gather entropy from devices are small. To overcome this issue, we can use rngd to pull entropy from the POWER7+ CPU and use it to seed /dev/urandom. In Fedora, rngd is included in the rng-tools package. Once it is installed, you can use systemctl to enable and activate the service. 4

5 # systemctl enable rngd.service # systemctl start rngd.service The rngd service continually reads entropy from the POWER7+ CPU through /dev/hwrng and write it out to /dev/random, which seeds the /dev/urandom entropy pool. As applications drain random bytes from /dev/urandom, it is continually reseeded with entropy from the POWER7+ CPU. 5 Monitoring Use of the Accelerators debugfs support is included in the nx-crypto driver, which allows for real-time monitoring of the use of the accelerators. After the nx-crypto driver is loaded, mount debugfs. # mount -t debugfs debugfs /sys/kernel/debug After debugfs is mounted, several special are exposed under /sys/kernel/debug/nx-crypto/. These files include: aes bytes: The number of bytes encrypted and decrypted by all modes of AES. aes ops: The number of requests sent to the accelerator for encryption or decryption in all modes of AES. errors: The total number of errors returned by the hypervisor that could not be mitigated by the driver. An example of an error mitigated by the driver is a retry of the operation if H BUSY is returned. last error: The last error returned by the hypervisor that could not be mitigated by the driver in response to a request sent by last error pid. last error pid: The process ID of the application that received last error. sha256 bytes: The number of bytes hashed using SHA-256. sha256 ops: The number of SHA-256 requests sent to the accelerator. sha512 bytes: The number of bytes hashed using SHA-512. sha512 ops: The number of SHA-512 requests sent to the accelerator. As mentioned previously, last error contains the error value returned by the hypervisor only when that error cannot be mitigated by the kernel. The most common errors returned are: H BUSY (1): The hardware is busy, try again later H RESOURCE ( ): Insufficient hypervisor resources to perform the operation H NOT ENOUGH RESOURCES ( ): Hypervisor memory is exhausted When any of these errors are encountered, the driver re-submits the request to the hypervisor. Only after 10 retries does the driver give up and log the error into last error. 5

6 6 Applications 6.1 Disk Encryption dm-crypt with LUKS One method of encrypting storage on a Linux system is to leverage the device mapper for encrypting a logical volume. dm-crypt is the device mapper kernel module to use, and keys for the volume are managed with the cryptsetup utility. cryptsetup manages the Linux Unified Key Setup (LUKS) header for your encrypted volume. After the nx-crypto driver is loaded, the only requirement for enabling acceleration of dm-crypt is to be sure that you are using the AES-CBC algorithm on your logical volume. To see the default cipher setting, use cryptsetup. $ cryptsetup --help tail -4 Default compiled-in device cipher parameters: loop-aes: aes, Key 256 bits plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: ripemd160 LUKS1: aes-cbc-essiv:sha256, Key: 256 bits, LUKS header hashing: sha1, RNG: /dev/urandom As encrypted files are read and written, you should be able to see the values for /sys/kernel/debug/nx-crypto/aes ops and /sys/kernel/debug/nx-crypto/aes bytes increase ecryptfs ecryptfs is a Virtual File System (VFS) layer encrypted file system included with most Linux distributions. Due to the large 4K encrypt and decrypt operations it uses when reading and writing data to disk, it is a good candidate to benefit from the POWER7+ accelerators. After the nx-crypto driver is loaded, the only requirement for enabling acceleration of ecryptfs is to be sure that you are using the AES algorithm on your ecryptfs mount point. This is indicated by the ecryptfs cipher=aes mount option. # mount grep ecryptfs cipher /mnt/lower on /mnt/upper type ecryptfs (rw,...,ecryptfs cipher=aes,...) As encrypted files and read and written, you should be able to see the values for /sys/kernel/debug/nx-crypto/aes ops and /sys/kernel/debug/nx-crypto/aes bytes increase. 6.2 IPSec Several of the AES modes accelerated by the POWER7+ CPU are specifically made for use with IPSec. Setup is as simple as configuring your IPSec implementation to use one of these modes StrongSwan To configure StrongSwan so that its IKE and ESP encryption is offloaded to the POWER7+ accelerators, use these options in /etc/strongswan/ipsec.conf: 6

7 ikev2= OR esp= POWER7+ algorithm Key Size aes128 AES-CBC 128 aes192 AES-CBC 192 aes256 AES-CBC 256 aes128ctr AES-CTR 128 aes192ctr AES-CTR 192 aes256ctr AES-CTR 256 aes128gcm8 AES-GCM 128 aes128gcm12 AES-GCM 128 aes128gcm16 AES-GCM 128 aes192gcm8 AES-GCM 192 aes192gcm12 AES-GCM 192 aes192gcm16 AES-GCM 192 aes256gcm8 AES-GCM 256 aes256gcm12 AES-GCM 256 aes256gcm16 AES-GCM 256 Table 1: StrongSwan cipher modes For more detailed information about configuring StrongSwan ciphers, see 7 Trademarks IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at Linux is a trademark of Linus Torvalds in the United States, other countries, or both. 7

Secure Storage with Encrypted file systems

Secure Storage with Encrypted file systems 2018/02/18 01:06 1/10 Secure Storage with Encrypted file systems Secure Storage with Encrypted file systems Encryption is done through dm-crypt using LUKS as the key setup using kernel crypto API. Linux

More information

Disk-Level Encryption

Disk-Level Encryption 2011-2017 Percona, Inc. 1 / 19 Disk-Level Encryption http://www.percona.com/training/ 2011-2017 Percona, Inc. 2 / 19 Introduction Clients in the PCI, HIPPA, or PHI space Encrypted "at rest" MySQL 5.7 InnoDB

More information

Linux Kernel Cryptographic API for fun and profit

Linux Kernel Cryptographic API for fun and profit Linux Kernel Cryptographic API for fun and profit Gilad Ben-Yossef Gilad Ben-Yossef gilad.benyossef@arm.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography

More information

Disk-Level Encryption

Disk-Level Encryption 2011-2017 Percona, Inc. 1 / 25 Disk-Level Encryption http://www.percona.com/training/ 2011-2017 Percona, Inc. 2 / 25 Disk-Level Encryption OVERVIEW 2011-2017 Percona, Inc. 3 / 25 Introduction Security,

More information

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.2 12/12/2013 Copyright 2013 Oracle Corporation Table of

More information

The Linux Kernel Cryptographic API

The Linux Kernel Cryptographic API Published on Linux Journal (http://www.linuxjournal.com) The Linux Kernel Cryptographic API By James Morris Created 2003-04-01 02:00 This article provides a brief overview of the new cryptographic API

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

IPSec Transform Set Configuration Mode Commands

IPSec Transform Set Configuration Mode Commands IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and

More information

Symantec Corporation

Symantec Corporation Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its

More information

IPSec Transform Set Configuration Mode Commands

IPSec Transform Set Configuration Mode Commands IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and

More information

How to abstract hardware acceleration device in cloud environment. Maciej Grochowski Intel DCG Ireland

How to abstract hardware acceleration device in cloud environment. Maciej Grochowski Intel DCG Ireland How to abstract hardware acceleration device in cloud environment Maciej Grochowski Intel DCG Ireland Outline Introduction to Hardware Accelerators Intel QuickAssist Technology (Intel QAT) as example of

More information

Writing drivers for the Linux Crypto subsystem

Writing drivers for the Linux Crypto subsystem May 18, 2014 Marek Vasut Software engineer at DENX S.E. since 2011 Embedded and Real-Time Systems Services, Linux kernel and driver development, U-Boot development, consulting, training. Versatile Linux

More information

Symmetric Encryption. Thierry Sans

Symmetric Encryption. Thierry Sans Symmetric Encryption Thierry Sans Design principles (reminder) 1. Kerkoff Principle The security of a cryptosystem must not rely on keeping the algorithm secret 2. Diffusion Mixing-up symbols 3. Confusion

More information

Anand Raghunathan

Anand Raghunathan ECE 695R: SYSTEM-ON-CHIP DESIGN Module 2: HW/SW Partitioning Lecture 2.26: Example: Hardware Architecture Anand Raghunathan raghunathan@purdue.edu ECE 695R: System-on-Chip Design, Fall 2014 Fall 2014,

More information

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

Storage encryption... what about data integrity?

Storage encryption... what about data integrity? Centre for Research on Cryptography and Security Storage encryption... what about data integrity? Milan Brož mbroz@redhat.com DevConf, Brno January 28, 2017 Agenda Data integrity what it is? Encryption

More information

SEC 2/3x Descriptor Programmer s Guide

SEC 2/3x Descriptor Programmer s Guide Freescale Semiconductor Application Note Document Number: AN3645 Rev. 3, 04/2010 SEC 2/3x Descriptor Programmer s Guide by Networking and Multimedia Group Freescale Semiconductor, Inc This application

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

Secure Key Management and Data Privacy on z/tpf

Secure Key Management and Data Privacy on z/tpf z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 Secure Key Management and Data Privacy on z/tpf Name : Mark Gambino

More information

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS 140-2 Non-Proprietary Security Policy, Version 1.7 Level 1 Validation October 2007 1. INTRODUCTION 3 2. PRODUCT, BOUNDARY,

More information

Linux on System z - Disk I/O Alternatives

Linux on System z - Disk I/O Alternatives Mustafa Mesanovic 3/21/11 Linux on System z - Disk I/O Alternatives visit us at http://www.ibm.com/developerworks/linux/linux390/perf/index.html Linux on System z Performance Evaluation Trademarks IBM,

More information

ECE 646 Lecture 8. Modes of operation of block ciphers

ECE 646 Lecture 8. Modes of operation of block ciphers ECE 646 Lecture 8 Modes of operation of block ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5 th and 6 th Edition, Chapter 6 Block Cipher Operation II. A. Menezes, P.

More information

Symmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.

Symmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES. Symmetric Key Encryption Symmetric Key Encryption and 3- Tom Chothia Computer Security: Lecture 2 Padding Block cipher modes Advanced Encryption Standard ( AES ) AES is a state-of-the-art block cipher.

More information

Performance Evaluation of Software Routers with VPN Features

Performance Evaluation of Software Routers with VPN Features 74 Telfor Journal, Vol. 9, No. 2, 2017. Performance Evaluation of Software s with VPN Features Hasan Redžović, Graduate Student Member, IEEE, Aleksandra Smiljanić, Member, IEEE, and Bogdan Savić Abstract

More information

Security features for UBIFS. Richard Weinberger sigma star gmbh

Security features for UBIFS. Richard Weinberger sigma star gmbh Richard Weinberger sigma star gmbh /me Richard Weinberger Co-founder of sigma star gmbh Linux kernel developer and maintainer Strong focus on Linux kernel, lowlevel components, virtualization, security

More information

Linux Random Number Generator A New Approach

Linux Random Number Generator A New Approach Linux Random Number Generator A New Approach Stephan Müller September 17, 2017 Abstract The venerable Linux /dev/random served users of cryptographic mechanisms well for a long time.

More information

SSH Algorithms for Common Criteria Certification

SSH Algorithms for Common Criteria Certification The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and

More information

Introduction to Linux features for disk I/O

Introduction to Linux features for disk I/O Martin Kammerer 3/22/11 Introduction to Linux features for disk I/O visit us at http://www.ibm.com/developerworks/linux/linux390/perf/index.html Linux on System z Performance Evaluation Considerations

More information

Hardware Cryptography and z/tpf

Hardware Cryptography and z/tpf z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any

More information

End-to-End Encryption of Data-at-Rest for Linux on IBM Z and LinuxONE

End-to-End Encryption of Data-at-Rest for Linux on IBM Z and LinuxONE End-to-End Encryption of Data-at-Rest for Linux on IBM Z and LinuxONE Reinhard Buendgen -- buendgen@de.ibm.com Product Owner Security for Linux on Z IBM Z / ZSP03160-USEN-38 / July 17, 2017 / 2017 IBM

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Authenticated Encryption

Authenticated Encryption 18733: Applied Cryptography Anupam Datta (CMU) Authenticated Encryption Online Cryptography Course Authenticated Encryption Active attacks on CPA-secure encryption Recap: the story so far Confidentiality:

More information

There are numerous Python packages for cryptography. The most widespread is maybe pycrypto, which is however unmaintained since 2015, and has

There are numerous Python packages for cryptography. The most widespread is maybe pycrypto, which is however unmaintained since 2015, and has 1 There are numerous Python packages for cryptography. The most widespread is maybe pycrypto, which is however unmaintained since 2015, and has unpatched buffer-overflow vulnerabilities. New projects should

More information

FIPS Security Policy UGS Teamcenter Cryptographic Module

FIPS Security Policy UGS Teamcenter Cryptographic Module FIPS 140-2 Security Policy UGS Teamcenter Cryptographic Module UGS Corp 5800 Granite Parkway, Suite 600 Plano, TX 75024 USA May 18, 2007 Version 1.3 containing OpenSSL library source code This product

More information

Crypto Device Drivers. Release

Crypto Device Drivers. Release Crypto Device Drivers Release 16.11.3 August 30, 2017 CONTENTS 1 Crypto Device Supported Functionality Matrices 1 2 AESN-NI Multi Buffer Crytpo Poll Mode Driver 3 2.1 Features........................................

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Lecture 4: Hashes and Message Digests,

Lecture 4: Hashes and Message Digests, T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary

More information

z/tpfdf Encryption Communications Subcommittee! IBM z/tpf April 11, 2016! Chris Filachek z/tpf and z/tpfdf Architecture & Development!

z/tpfdf Encryption Communications Subcommittee! IBM z/tpf April 11, 2016! Chris Filachek z/tpf and z/tpfdf Architecture & Development! z/tpfdf Encryption Communications Subcommittee! Chris Filachek z/tpf and z/tpfdf Architecture & Development! IBM z/tpf April 11, 2016! Copyright IBM Corporation 2016. U.S. Government Users Restricted Rights

More information

Using Hardware Crypto Support in Linux on System z

Using Hardware Crypto Support in Linux on System z Using Hardware Crypto Support in Linux on System z Dr. Reinhard Buendgen (buendgen@de.ibm.com) IBM Deutschland Research & Development March 15, 2012 Session 11076 Trademarks The following are trademarks

More information

EMC VNX Series: Introduction to SMB 3.0 Support

EMC VNX Series: Introduction to SMB 3.0 Support White Paper EMC VNX Series: Introduction to SMB 3.0 Support Abstract This white paper introduces the Server Message Block (SMB) 3.0 support available on the EMC VNX and the advantages gained over the previous

More information

Confessions of a security hardware driver maintainer

Confessions of a security hardware driver maintainer Confessions of a security hardware driver maintainer Gilad Ben-Yossef Principal Software Engineer About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography and security in genera,l

More information

Performance Enhancement for IPsec Processing on Multi-Core Systems

Performance Enhancement for IPsec Processing on Multi-Core Systems Performance Enhancement for IPsec Processing on Multi-Core Systems Sandeep Malik Freescale Semiconductor India Pvt. Ltd IDC Noida, India Ravi Malhotra Freescale Semiconductor India Pvt. Ltd IDC Noida,

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 24th March 2016 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture

M2351 Security Architecture. TrustZone Technology for Armv8-M Architecture Architecture TrustZone Technology for Armv8-M Architecture Outline NuMicro Architecture TrustZone for Armv8-M Processor Core, Interrupt Handling, Memory Partitioning, State Transitions. TrustZone Implementation

More information

Security IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y

Security IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing l e a d i n g t h e w a y l e a d i n g t h e w a y Secure your sensitive content, guarantee its integrity and

More information

Chapter 18: wolfcrypt API Reference

Chapter 18: wolfcrypt API Reference Chapter 18: wolfcrypt API Reference Table of Contents March, 2016 Version 3.9.0 18.1 AES 18.2 Arc4 18.3 ASN 18.4 Blake2 18.5 Camellia 18.6 ChaCha 18.7 ChaCha20 with Poly1305 18.8 Coding 18.9 Compression

More information

IKEv2-SCSI (06-449) Update

IKEv2-SCSI (06-449) Update 1 IKEv2-SCSI (06-449) Update David L. Black 2 IKEv2-SCSI (06-449) Plans and Status Plan Revise IKEv2-SCSI draft for approval at this meeting Reality The best laid schemes o' Mice an' Men... gang aft FCoE!!

More information

Your Roadmap to POWER9: Migration Scenarios

Your Roadmap to POWER9: Migration Scenarios Your Roadmap to POWER9: Migration Scenarios IBM POWER9 Making the investment to upgrade your systems ensures you have the most reliable foundational infrastructure for your daily operations. IBM Power

More information

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018 Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.

More information

Secure storage in OP-TEE. Jens Wiklander

Secure storage in OP-TEE. Jens Wiklander Secure storage in OP-TEE Jens Wiklander ENGINEERS AND DEVICES WORKING TOGETHER Agenda What is secure storage? Timeline - secure storage improvements Encryption keys Secure Object Hash tree Hash tree header

More information

IPSec Site-to-Site VPN (SVTI)

IPSec Site-to-Site VPN (SVTI) 13 CHAPTER Resource Summary for IPSec VPN IKE Crypto Key Ring Resource IKE Keyring Collection Resource IKE Policy Resource IKE Policy Collection Resource IPSec Policy Resource IPSec Policy Collection Resource

More information

Authenticated Encryption

Authenticated Encryption 18733: Applied Cryptography Anupam Datta (CMU) Authenticated Encryption Online Cryptography Course Authenticated Encryption Active attacks on CPA-secure encryption Recap: the story so far Confidentiality:

More information

IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S)

IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S) IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S) 1 Copyright IBM Corporation 1994, 2015. IBM Corporation Marketing Communications, Server Group Route 100 Somers, NY

More information

Inline LOBs (Large Objects)

Inline LOBs (Large Objects) Inline LOBs (Large Objects) Jeffrey Berger Senior Software Engineer DB2 Performance Evaluation bergerja@us.ibm.com Disclaimer/Trademarks THE INFORMATION CONTAINED IN THIS DOCUMENT HAS NOT BEEN SUBMITTED

More information

OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications.

OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications. 1 OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications. The toolkit offers a series of command-line tools to perform

More information

Analyzing the Generation and Optimization of an FPGA Accelerator using High Level Synthesis

Analyzing the Generation and Optimization of an FPGA Accelerator using High Level Synthesis Paper Analyzing the Generation and Optimization of an FPGA Accelerator using High Level Synthesis Sebastian Kaltenstadler Ulm University Ulm, Germany sebastian.kaltenstadler@missinglinkelectronics.com

More information

Crypto: Passwords and RNGs. CS 642 Guest Lecturer: Adam Everspaugh

Crypto: Passwords and RNGs. CS 642 Guest Lecturer: Adam Everspaugh Crypto: Passwords and RNGs CS 642 Guest Lecturer: Adam Everspaugh http://pages.cs.wisc.edu/~ace Topics! Password-based Crypto!! Random Number Generators Symmetric Key Encryption key generation R k Gen

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood

More information

ryptograi "ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project

ryptograi ГС for Tom St Denis, Elliptic Semiconductor Inc. Simon Johnson and Author of the LibTom Project for ryptograi "ГС V6 е Tom St Denis, Elliptic Semiconductor Inc. and Author of the LibTom Project Simon Johnson Contents Preface Chapter 1 Introduction 1 Introduction 2 Threat Models 3 What Is Cryptography?

More information

Introducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine

Introducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine Introducing the PIC24F GB2 MCU Family: extreme Low Power with Hardware Crypto Engine Alexis Alcott, Product Marketing Manager, MCU16 Division June 24, 2014 2 Announcing at Sensors Expo PIC24F GB2 MCUs

More information

Content of this part

Content of this part UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this

More information

Blueprints. Protecting your data at rest with Red Hat Enterprise Linux on System x

Blueprints. Protecting your data at rest with Red Hat Enterprise Linux on System x Blueprints Protecting your data at rest with Red Hat Enterprise Linux on System x Blueprints Protecting your data at rest with Red Hat Enterprise Linux on System x Note Before using this information and

More information

SP Reviewing The Standard. Stephan Müller atsec information security GmbH

SP Reviewing The Standard. Stephan Müller atsec information security GmbH SP800-90 Reviewing The Standard Stephan Müller atsec information security GmbH Email: smueller@atsec.com 13 ICMC 2013, September 24-26, Gaithersburg, MD 13 Agenda Practical aspects of implementing SP800-90A

More information

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_OSX_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple

More information

Pervasive Encryption for Linux on z Systems and LinuxONE

Pervasive Encryption for Linux on z Systems and LinuxONE Pervasive Encryption for Linux on z Systems and LinuxONE Reinhard Buendgen -- buendgen@de.ibm.com Crypto Architect for Linux on z IBM Z / ZSP03160-USEN-38 / July 17, 2017 / 2017 IBM Corporation Trademarks

More information

INSE 6110 Midterm LAST NAME FIRST NAME. Fall 2016 Duration: 80 minutes ID NUMBER. QUESTION Total GRADE. Notes:

INSE 6110 Midterm LAST NAME FIRST NAME. Fall 2016 Duration: 80 minutes ID NUMBER. QUESTION Total GRADE. Notes: A INSE 6110 Midterm Fall 2016 Duration: 80 minutes LAST NAME FIRST NAME ID NUMBER QUESTION 1 2 3 4 Total GRADE Notes: 1) Calculator (non-programming) allowed, nothing else permitted 2) Each page contains

More information

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital

More information

FIPS Security Policy

FIPS Security Policy Motorola Mobility Linux Kernel Software Cryptographic Module FIPS 140-2 Security Policy Module Version 1.0 Document version 1.13 March 11, 2015 This document may be freely copied and distributed provided

More information

Crypto Device Drivers. Release

Crypto Device Drivers. Release Crypto Device Drivers Release 17.02.1 June 02, 2017 CONTENTS 1 Crypto Device Supported Functionality Matrices 1 2 AESN-NI Multi Buffer Crytpo Poll Mode Driver 3 2.1 Features........................................

More information

Protecting your system from the scum of the universe

Protecting your system from the scum of the universe Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream

More information

Attacking the Linux PRNG on Android. David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems

Attacking the Linux PRNG on Android. David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems Attacking the Linux PRNG on Android David Kaplan, Sagi Kedmi, Roee Hay & Avi Dayan IBM Security Systems MOTIVATION motivation_keystore_buffer_overflow We discovered CVE-2014-3100, a stack-based Buffer

More information

Lecture 3: Symmetric Key Encryption

Lecture 3: Symmetric Key Encryption Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07

More information

NCP Secure Enterprise macos Client Release Notes

NCP Secure Enterprise macos Client Release Notes Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra

More information

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy EgoSecure GmbH EgoSecure Full Disk Encryption (FDE) Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.5 06/12/2014 Copyright EgoSecure GmbH, 2014. May be reproduced only

More information

The Rectangle Attack

The Rectangle Attack The Rectangle Attack and Other Techniques for Cryptanalysis of Block Ciphers Orr Dunkelman Computer Science Dept. Technion joint work with Eli Biham and Nathan Keller Topics Block Ciphers Cryptanalysis

More information

NCP Secure Entry macos Client Release Notes

NCP Secure Entry macos Client Release Notes Service Release: 3.20 r43098 Date: March 2019 Prerequisites Apple macos operating systems: The following Apple macos operating systems are supported with this release: macos Mojave 10.14 macos High Sierra

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

The Pervasive Encryption Imperative. IBM Competitive Project Office Mark Moore Senior Software Engineer

The Pervasive Encryption Imperative. IBM Competitive Project Office Mark Moore Senior Software Engineer The Pervasive Encryption Imperative IBM Competitive Project Office Mark Moore Senior Software Engineer June 2017 Contents Introduction... 3 Pervasive encryption to address a pervasive threat... 3 Starting

More information

FIPS Level 1 Validation March 31, 2011 Version 1.12

FIPS Level 1 Validation March 31, 2011 Version 1.12 KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library Version 3.0 Security Policy FIPS 140-2 Level 1 Validation March 31, 2011 Version 1.12 Table of Contents 1 Introduction... 1 1.1 Acronyms and

More information

Securing Network Traffic Tunneled Over Kernel managed TCP/UDP sockets

Securing Network Traffic Tunneled Over Kernel managed TCP/UDP sockets Securing Network Traffic Tunneled Over Kernel managed TCP/UDP sockets Sowmini Varadhan(sowmini.varadhan@oracle.com) Agenda Proceedings of NetDev 1.1: The Technical Conference on Linux Networking (February

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Random Bit Generators (Sections 8.1-8.3) February 20, 2018 Overview Today: HW 4 solution discussion Pseudorandom generation - concepts and simple techniques Reminder:

More information

Virtual Private Networks (VPN)

Virtual Private Networks (VPN) CYBR 230 Jeff Shafer University of the Pacific Virtual Private Networks (VPN) 2 Schedule This Week Mon September 4 Labor Day No class! Wed September 6 VPN Project 1 Work Fri September 8 IPv6? Project 1

More information

Protecting your system from the scum of the universe

Protecting your system from the scum of the universe Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream

More information

Accelerated Library Framework for Hybrid-x86

Accelerated Library Framework for Hybrid-x86 Software Development Kit for Multicore Acceleration Version 3.0 Accelerated Library Framework for Hybrid-x86 Programmer s Guide and API Reference Version 1.0 DRAFT SC33-8406-00 Software Development Kit

More information

Parallelizing IPsec: switching SMP to On is not even half the way

Parallelizing IPsec: switching SMP to On is not even half the way Parallelizing IPsec: switching SMP to On is not even half the way Steffen Klassert secunet Security Networks AG Dresden June 11 2010 Table of contents Some basics about IPsec About the IPsec performance

More information

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9 Apple Inc. Apple ios CoreCrypto Kernel Module, v3.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.03 Version 01.03 April, 2013 Prepared for: Apple

More information

Datapath. Encryption

Datapath. Encryption Datapath The following refers to the IKE/IPsec datapath implementation of overlay tunnels between Silver Peak devices. VXOA Release 7.3 (Regular "IPsec" mode with IKE) 8.0 (Regular "IPsec" mode with IKE)

More information

Secure Networking with NAT Traversal for Enhanced Mobility

Secure Networking with NAT Traversal for Enhanced Mobility Secure Networking with NAT Traversal for Enhanced Mobility Lubomir Cvrk 1, Vit Vrba 1 1 Brno University of Technology, Dept. of Telecommunications, Purkynova 118, 61200 Brno, Czech Republic {cvrk, vrba}@westcom.cz

More information

Block Cipher Operation. CS 6313 Fall ASU

Block Cipher Operation. CS 6313 Fall ASU Chapter 7 Block Cipher Operation 1 Outline q Multiple Encryption and Triple DES q Electronic Codebook q Cipher Block Chaining Mode q Cipher Feedback Mode q Output Feedback Mode q Counter Mode q XTS-AES

More information

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 12 Message Authentication Codes At cats' green on the Sunday he took the message from

More information

Enabling DM_Crypt Functionality in SDK release 5.07

Enabling DM_Crypt Functionality in SDK release 5.07 Enabling DM_Crypt Functionality in SDK release 5.07 This document lists steps to enable DM_Crypt functionality in SDK 05.07 Note: This document is intended for use with SDK release 5.07 and Ubuntu 10.04LTS.

More information

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R) Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy

More information

Overview of cryptography and enhancements on z/vse 4.3

Overview of cryptography and enhancements on z/vse 4.3 Overview of cryptography and enhancements on z/vse 4.3 Joerg Schmidbauer jschmidb@de.ibm.com March, 2011 Trademarks Trademarks The following are trademarks of the International Business Machines Corporation

More information

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE. INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building

More information

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N

More information

Security Policy for FIPS KVL 3000 Plus

Security Policy for FIPS KVL 3000 Plus Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...

More information

Linux system monitoring

Linux system monitoring Linux system monitoring Martin Kammerer 06/14/2010 visit us at http://www.ibm.com/developerworks/linux/linux390/perf/index.html Page 1 of 14 Linux system monitoring 2010 IBM Corporation Table of Contents

More information

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE) Cryptographic module used in Motorola Solutions Astro XTL5000, XTS5000, APX2000, SRX2200, APX4000, APX6000, APX6000XE, APX6500,

More information