Integrated CPU Cryptography Acceleration Secures Small Computers

Total Page:16

File Type:pdf, Size:1020Kb

Integrated CPU Cryptography Acceleration Secures Small Computers Technology Desktop trends shrink to small form factors Integrated CPU cryptography acceleration secures small computers By J. Scott Gardner Security is becoming an unconditional requirement for even the smallest adoption of digital signatures, of embedded systems. New cryptography support is now available in a secure system must implement the form of on-CPU hardware and Operating Systems (OSs) APIs. larger hash functions. After 2010, These implementations save size, power, and cost while increasing the NIST has specified that federal performance of cryptographic functions. agencies should no longer use SHA-1 and must migrate to the more intensive SHA-2 family. 3. Advanced Encryption Cipher: For embedded systems designers, spare What does secure computing Advanced Encryptionly Standard CPU cycles quickly become a precious really mean? (AES)n replacing Data Encryption resource as the software workload seem- While government agencies have created Standard (DES) and Triple DES ingly always grows to double the original rigorous definitions for secure systems, O(3DES). A secure cipher lies at the prediction for the system. Many small commercial products vendors have takent heart of any cryptography system, form factor products operate in environ- several marketing liberties when making and AES has emerged as required ments that require security features for claims about security. With ithen new technology for secure systems. protecting information, yet the protection industry focus for a morer disciplined Many small form factor products level often has to be scaled back to free approach to security,P any definition of are used in networking applications up compute resources for the primary secure computing should be evaluated that require multiple secure sessions. software tasks. In the past, designers for three broadle computing categories: One of the more popular protocols, could cut corners with security features random number generation, secure hash- Internet Protocol security (IPsec), given that many nongovernmental cus- ing functions,g and cryptographic ciphers. allows an encrypted message payload tomers viewed security as a “check-box” inThe National Institute of Standards and or fully secure packets (encrypting item and didn’t understand the stagger- Technology (NIST) provides quantitative all header information as well as the ing complexity that differentiates Sgood testing methods for evaluating the follow- payload). Now that AES is replacing implementations. Of course, rthe system ing operations: DES and 3DES, AES-encrypted software developers aren’to given enough sessions will quickly overload soft- time in development schedules to imple- 1. Random numbers: Pseudorandom ware implementations. To support ment and verifyF robust cryptographic may not be good enough. The multiple IPsec streams, small form algorithms. evolving baseline for any secure factor products will need to integrate implementation should include hardware acceleration for AES. But now, increasing unconditional the fast generation of numbers that requirements for secure computing are exhibit high degrees of random- Cryptographics move on chip causing a seismic shift in the industry. ness, far beyond the pseudorandom Until now, designers with security needs The good news for system developers numbers from lightweight software have incorporated dedicated security hard- is that mainstream CPUs are incorpo- algorithms. Good random numbers ware in the form of either a fixed-function rating cryptographic function hardware are critical for generating truly secure device or a specialized communications acceleration, eliminating most of the encryption keys. While software processor with cryptographic features. performance penalties that result from algorithms attempt to create random But this approach has disadvantages in providing more than token security fea- numbers by sampling system events cost, power, size, and system efficiency. tures. Instead of being forced to write low- (keystrokes, network activity, timer In a 2006 report from The Linley Group, level code to enable security hardware, values, and others), enough determin- “A Guide to Security and Content Proces- software developers gain transparent ism often remains in the algorithms sors,” Fifth Edition, volume prices range access to CPU acceleration through stan- to reduce the randomness of the from $85 for the SafeNet 1842 to $700 for dard cryptographic API calls. As newer values. Hardware implementations the Cavium Nitrox II 2800, while power x86 CPUs with on-chip cryptographic measure on-chip circuits that vary consumption ranges from 5 W to 15 W. acceleration become available, embed- with electronic noise, resulting in Adding another chip or daughterboard ded system designers can access the PC extremely high entropy. has limitations that transcend the obvious ecosystem with built-in security APIs 2. Secure hash functions: NIST cost barrier. Most small form factor for all major OSs. The simplified soft- moving beyond Secure Hash products still require a general purpose ware model, coupled with low-cost CPU Algorithm 1 (SHA-1). Hashing processor, and the system architec- acceleration, ensures that real security algorithms are used in many cryp- ture often transfers data multiple times will finally become pervasive in small tographic tasks, including random between the CPUs, system bus, and form factor embedded systems. number generation. With the rapid memory subsystems. The software model PC/104 and Small Form Factors ©2007 OpenSystems Publishing. Not for Distribution. can become quite complicated, and cessors were one of the first x86 CPUs to mates that AES cryptography requires system designers often must write their integrate cryptographic acceleration (see 117 CPU clocks per byte, in dramatic own low-level drivers to fit the external sidebar), RISC CPUs are now promoting contrast to a fully integrated x86 CPU cryptographic hardware into the memory secure computing with a combination of solution that takes 1.5 clocks per byte. maps, direct memory access, and inter- hardware and software features. In the rupt request architecture. Freescale i.MX family of multimedia Accelerating the OS application processors, for example, the The enormous software ecosystem is Integrating cryptographic functions on i.MX31 runs software cryptographic one of the unchallenged advantages of the CPU reduces size, power, and system algorithms in an ARM11 core, dedicating the x86 architecture. Every major desk- cost while improving system efficiency hardware resources to physical security top and embedded OS now has a set over off-CPU solutions. While VIA pro- for storing keys in RAM. Freescale esti- of cryptographic primitives in an API PADLOCK PadLock – cryptography for free In 2002, VIA’s Centaur design team led by Glenn Henry began n The CPU measures the random frequency of integrating cryptographic acceleration on all its CPUs under free-running ring oscillators, autonomously filling the VIA PadLock initiative. The accelerators piggyback on the a queue with new random numbers lfory software to main processor pipeline, allowing hardware engines to add access. These ring oscillators nproduced better less than a square millimeter of silicon area. randomness than traditional approaches that measure diode noise. O Unlike dedicated, slow ASICs, these on-chip cryptographic n The SHA-256 hardwaret accelerator integrated on-chip is engines operate at the same multi-GHz clock speeds as the rest part of the SHA-2 family. of the circuit-optimized pipeline. A cryptographic operation is n Accordingin to independent testing groups, the on-chip launched with a single instruction that can be accessed with AESr hardware engine is fast enough to remove Ring 3 privileges. This unified programming model allows Pcryptography as the performance bottleneck (as much straightforward software support, eliminating thousands of as 80 times faster than software), allowing networking lines of code when compared to software cryptography.l e performance to scale with the speed of the memory subsystem. Figure 1 shows the VIA C7 block diagram. The C7g processor is the latest VIA x86 family and implementsin on-chip the three For more information, download the PadLock whitepaper at critical secure computing functionsr S described earlier: www.via.com.tw/en/initiatives/padlock/. Fo Figure 1 PC/104 and Small Form Factors ©2007 OpenSystems Publishing. Not for Distribution. Technology Desktop trends shrink to small form factors library that relieves software writers VoIP sessions, potentially requiring AES from the mathematical complexity of to encrypt packets. Each node of the cryptographic algorithms. In addition to mesh is part of a secure network that uses the CryptoAPI in Linux, software devel- temporal, symmetric AES encryption and opers can access cryptographic func- certificated key exchange to ensure data tions in Java and the various flavors of is secure and only gets routed through Microsoft Windows, including Windows trusted nodes. The MeshBox uses hard- CE, Embedded XP, and Windows Vista. ware encryption to maintain a secure wired backhaul with the network hub. The OS provides a mechanism for Without hardware acceleration, the node enabling cryptographic function hard- throughput would be severely limited. ware acceleration. Some OSs require a Software Development Kit (SDK) from The future for small, secure the hardware vendor to install accelerated computing versions of the cryptographic functions. The adoption of secure computing has
Recommended publications
  • SIMD Extensions
    SIMD Extensions PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 12 May 2012 17:14:46 UTC Contents Articles SIMD 1 MMX (instruction set) 6 3DNow! 8 Streaming SIMD Extensions 12 SSE2 16 SSE3 18 SSSE3 20 SSE4 22 SSE5 26 Advanced Vector Extensions 28 CVT16 instruction set 31 XOP instruction set 31 References Article Sources and Contributors 33 Image Sources, Licenses and Contributors 34 Article Licenses License 35 SIMD 1 SIMD Single instruction Multiple instruction Single data SISD MISD Multiple data SIMD MIMD Single instruction, multiple data (SIMD), is a class of parallel computers in Flynn's taxonomy. It describes computers with multiple processing elements that perform the same operation on multiple data simultaneously. Thus, such machines exploit data level parallelism. History The first use of SIMD instructions was in vector supercomputers of the early 1970s such as the CDC Star-100 and the Texas Instruments ASC, which could operate on a vector of data with a single instruction. Vector processing was especially popularized by Cray in the 1970s and 1980s. Vector-processing architectures are now considered separate from SIMD machines, based on the fact that vector machines processed the vectors one word at a time through pipelined processors (though still based on a single instruction), whereas modern SIMD machines process all elements of the vector simultaneously.[1] The first era of modern SIMD machines was characterized by massively parallel processing-style supercomputers such as the Thinking Machines CM-1 and CM-2. These machines had many limited-functionality processors that would work in parallel.
    [Show full text]
  • Rigorous Cache Side Channel Mitigation Via Selective Circuit Compilation
    RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation B Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber( ), Christian Weinert, and Tim Weißmantel Technical University of Darmstadt, Darmstadt, Germany {mantel,weber,weissmantel}@mais.informatik.tu-darmstadt.de, {scheidel,schneider,weinert}@encrypto.cs.tu-darmstadt.de Abstract. Cache side channels constitute a persistent threat to crypto implementations. In particular, block ciphers are prone to attacks when implemented with a simple lookup-table approach. Implementing crypto as software evaluations of circuits avoids this threat but is very costly. We propose an approach that combines program analysis and circuit compilation to support the selective hardening of regular C implemen- tations against cache side channels. We implement this approach in our toolchain RiCaSi. RiCaSi avoids unnecessary complexity and overhead if it can derive sufficiently strong security guarantees for the original implementation. If necessary, RiCaSi produces a circuit-based, hardened implementation. For this, it leverages established circuit-compilation technology from the area of secure computation. A final program analysis step ensures that the hardening is, indeed, effective. 1 Introduction Cache side channels are unintended communication channels of programs. Cache- side-channel leakage might occur if a program accesses memory addresses that depend on secret information like cryptographic keys. When these secret-depen- dent memory addresses are loaded into a shared cache, an attacker might deduce the secret information based on observing the cache. Such cache side channels are particularly dangerous for implementations of block ciphers, as shown, e.g., by attacks on implementations of DES [58,67], AES [2,11,57], and Camellia [59,67,73].
    [Show full text]
  • Siderand: a Heuristic and Prototype of a Side-Channel-Based Cryptographically Secure Random Seeder Designed to Be Platform- and Architecture-Agnostic
    SideRand: A Heuristic and Prototype of a Side-Channel-Based Cryptographically Secure Random Seeder Designed to Be Platform- and Architecture-Agnostic JV ROIG, Advanced Research Center – Asia Pacific College Generating secure random numbers is vital to the security and privacy infrastructures we rely on today. Having a computer system generate a secure random number is not a trivial problem due to the deterministic nature of computer systems. Servers commonly deal with this problem through hardware-based random number generators, which can come in the form of expansion cards, dongles, or integrated into the CPU itself. With the explosion of network- and internet-connected devices, however, the problem of cryptography is no longer a server-centric problem; even small devices need a reliable source of randomness for cryptographic operations – for example, network devices and appliances like routers, switches and access points, as well as various Internet-of-Things (IoT) devices for security and remote management. This paper proposes a software solution based on side-channel measurements as a source of high- quality entropy (nicknamed “SideRand”), that can theoretically be applied to most platforms (large servers, appliances, even maker boards like RaspberryPi or Arduino), and generates a seed for a regular CSPRNG to enable proper cryptographic operations for security and privacy. This paper also proposes two criteria – openness and auditability – as essential requirements for confidence in any random generator for cryptographic use, and discusses how SideRand meets the two criteria (and how most hardware devices do not). CCS Concepts: • Security and privacy → Cryptography KEYWORDS Cryptographically secure random number generation; side-channel based CSPRNG 1 INTRODUCTION 1.1 Generating Random Numbers for Privacy and Security The ability to generate strong random numbers is essential to cryptography, and central to security and privacy in the IT world.
    [Show full text]
  • Communication Theory II
    Microprocessor (COM 9323) Lecture 2: Review on Intel Family Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt Feb 17th, 2016 1 Text Book/References Textbook: 1. The Intel Microprocessors, Architecture, Programming and Interfacing, 8th edition, Barry B. Brey, Prentice Hall, 2009 2. Assembly Language for x86 processors, 6th edition, K. R. Irvine, Prentice Hall, 2011 References: 1. Computer Architecture: A Quantitative Approach, 5th edition, J. Hennessy, D. Patterson, Elsevier, 2012. 2. The 80x86 Family, Design, Programming and Interfacing, 3rd edition, Prentice Hall, 2002 3. The 80x86 IBM PC and Compatible Computers, Assembly Language, Design, and Interfacing, 4th edition, M.A. Mazidi and J.G. Mazidi, Prentice Hall, 2003 2 Lecture Objectives 1. Provide an overview of the various 80X86 and Pentium family members 2. Define the contents of the memory system in the personal computer 3. Convert between binary, decimal, and hexadecimal numbers 4. Differentiate and represent numeric and alphabetic information as integers, floating-point, BCD, and ASCII data 5. Understand basic computer terminology (bit, byte, data, real memory system, protected mode memory system, Windows, DOS, I/O) 3 Brief History of the Computers o1946 The first generation of Computer ENIAC (Electrical and Numerical Integrator and Calculator) was started to be used based on the vacuum tube technology, University of Pennsylvania o1970s entire CPU was put in a single chip. (1971 the first microprocessor of Intel 4004 (4-bit data bus and 2300 transistors and 45 instructions) 4 Brief History of the Computers (cont’d) oLate 1970s Intel 8080/85 appeared with 8-bit data bus and 16-bit address bus and used from traffic light controllers to homemade computers (8085: 246 instruction set, RISC*) o1981 First PC was introduced by IBM with Intel 8088 (CISC**: over 20,000 instructions) microprocessor oMotorola emerged with 6800.
    [Show full text]
  • Evolution Des X86befehlssatzes Und Seiner Erweiterungen
    Technische Universität Dresden Evolution des x86-Befehlssatzes und seiner Erweiterungen Peter Ebert Dresden, 15.07.2009 Einführung · Überblick & Historie · Konkurrierende Befehlssatzarchitekture n · Befehlsarten · Registerstruktur · x87 15.07.2009 Evolution des x86-Befehlssatzes und seiner Erweiterungen 2/24 Übersicht & Historie · IBM 1981: erster PC · x86-Architektur verwendet einen CISC-Befehlssatz · alle Prozessoren seit dem Pentium Pro sind aber hybride CISC/RISC-Prozessoren 1978 1. Gen.: 8086 1982 2. Gen.: 80286 1985 3. Gen.: 80386 IA-32 1989 4. Gen.: 80486 1993 5. Gen.: Pentium MMX 1995 6. Gen.: P2, P3 3DNow!, SSE 1999 7. Gen.: Athlon (XP), P4 SSE2 2003 8. Gen.: Opteron x86-64 15.07.2009 Evolution des x86-Befehlssatzes und seiner Erweiterungen 3/24 Konkurrierende Befehlssatzarchitekturen · ARM (Acorn Risc Machine) RISC-Architektur 1983 vom englischen Computerhersteller Acorn. Einsatz vor allem im eingebetteten Bereich z.B.: Mobiltelefonen, PDAs, Routern, iPod, iPhone, Internet Tablets von Nokia und den neueren PDAs von ASUS, Konsolen wie der Nintendo DS, der GP2X und die Pandora. · PowerPC (Performance optimization with enhanced RISC Performance Chip) 1991 durch ein Konsortium aus Apple, IBM und Motorola. z.B.: Nintendo GameCube und Wii, Xbox 360 von Microsoft, Playstation 3 von Sony und in vielen eingebetteten Systemen. Auch benutzen PKW und Produkte in der Luft- und Raumfahrt · SPARC (Scalable Processor ARChitecture) Von Sun Microsystems entwickelt ab 1985 und vermarktete ab 1987, offene Architektur, 1995 64-Bit-Erweiterung (UltraSparc) 15.07.2009 Evolution des x86-Befehlssatzes und seiner Erweiterungen 4/24 Befehlsarten · Transferbefehlen werden Daten innerhalb des Systems bewegt. Die Daten werden dabei nur kopiert, d. h. bleiben an ihrem Quellort unverändert.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • SBC82700 Series All-In-One Half-Size CPU Card with Dualview Display and SATA User's Manual
    SBC82700 Series All-In-One Half-Size CPU Card With DualView Display and SATA User’s Manual Disclaimers This manual has been carefully checked and believed to contain accurate information. AXIOMTEK Co., Ltd. assumes no responsibility for any infringements of patents or any third party’s rights, and any liability arising from such use. AXIOMTEK does not warrant or assume any legal liability or responsibility for the accuracy, completeness or usefulness of any information in this document. AXIOMTEK does not make any commitment to update the information in this manual. AXIOMTEK reserves the right to change or revise this document and/or product at any time without notice. No part of this document may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of AXIOMTEK Co., Ltd. Caution If you replace wrong batteries, it causes the danger of explosion. It is recommended by the manufacturer that you follow the manufacturer’s instructions to only replace the same or equivalent type of battery, and dispose of used ones. ©Copyright 2007 AXIOMTEK Co., Ltd. All Rights Reserved September 2007, Version A1 Printed in Taiwan ii ESD Precautions Computer boards have integrated circuits sensitive to static electricity. To prevent chipsets from electrostatic discharge damage, please take care of the following jobs with precautions: Do not remove boards or integrated circuits from their anti-static packaging until you are ready to install them. Before holding the board or integrated circuit, touch an unpainted portion of the system unit chassis for a few seconds.
    [Show full text]
  • SMBIOS Specification
    1 2 Document Identifier: DSP0134 3 Date: 2019-10-31 4 Version: 3.4.0a 5 System Management BIOS (SMBIOS) Reference 6 Specification Information for Work-in-Progress version: IMPORTANT: This document is not a standard. It does not necessarily reflect the views of the DMTF or its members. Because this document is a Work in Progress, this document may still change, perhaps profoundly and without notice. This document is available for public review and comment until superseded. Provide any comments through the DMTF Feedback Portal: http://www.dmtf.org/standards/feedback 7 Supersedes: 3.3.0 8 Document Class: Normative 9 Document Status: Work in Progress 10 Document Language: en-US 11 System Management BIOS (SMBIOS) Reference Specification DSP0134 12 Copyright Notice 13 Copyright © 2000, 2002, 2004–2019 DMTF. All rights reserved. 14 DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems 15 management and interoperability. Members and non-members may reproduce DMTF specifications and 16 documents, provided that correct attribution is given. As DMTF specifications may be revised from time to 17 time, the particular version and release date should always be noted. 18 Implementation of certain elements of this standard or proposed standard may be subject to third party 19 patent rights, including provisional patent rights (herein "patent rights"). DMTF makes no representations 20 to users of the standard as to the existence of such rights, and is not responsible to recognize, disclose, 21 or identify any or all such third party patent right, owners or claimants, nor for any incomplete or 22 inaccurate identification or disclosure of such rights, owners or claimants.
    [Show full text]
  • Cryptoprocessing on the Arduino
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives Cryptoprocessing on the Arduino Protecting user data using affordable microcontroller development kits Stig Tore Johannesen Master of Science in Informatics Submission date: August 2014 Supervisor: Guttorm Sindre, IDI Co-supervisor: Danilo Gligoroski, ITEM Norwegian University of Science and Technology Department of Computer and Information Science Acknowledgements I would like to thank my thesis advisor, Guttorm Sindre, for all his help during the writing process. I would also like to thank my co-advisor, Danilo Gligoroski, for getting me started on the technical aspect of the report. Thanks are also owed to everyone who helped me by reading through and commenting on the structure and language of this report. i ii Abstract There is a growing trend of data breaches, which this report looks into. The breaches often turn out to have, at their core, an element of either poor security management, or outdated or incorrectly applied security procedures. With this in mind, an affordable off-the-shelf microcontroller development kit is suggested as a way to lessen the impact of data theft during data breaches. Utilising an Arduino Due this report looks at the performance avail- able for cryptoprocessing and key storage, showing that while it is not a viable solution for encrypting large amounts of data, it is however suitable for securely encrypting limited data sets, such as customer data. iii iv Table of Contents 1 Introduction3 1.1 Goal.....................................4 2 Research Methods5 2.1 Possible Methodologies...........................5 2.2 Research Question 1............................6 2.3 Research Question 2............................6 2.4 Research Question 3............................7 2.5 Research Question 4............................7 3 Background9 3.1 Breaches...................................9 3.1.1 Sony Online Entertainment, 2011.................9 3.1.2 LinkedIn, 2012..........................
    [Show full text]
  • Architecture of VIA Isaiah (NANO)
    Architecture of VIA Isaiah (NANO) Jan Davidek dav053 2008/2009 1. Introduction to the VIA Nano™ Processor The last few years have seen significant changes within the microprocessor industry, and indeed the entire IT landscape. Much of this change has been driven by three factors: the increasing focus of both business and consumer on energy efficiency, the rise of mobile computing, and the growing performance requirements of computing devices in a fast expanding multimedia environment. In the microprocessor space, the traditional race for ever faster processing speeds has given way to one that factors in the energy used to achieve those speeds. Performance per watt is the new metric by which quality is measured, with all the major players endeavoring to increase the performance capabilities of their products, while reducing the amount of energy that they require. Based on the recently announced VIA Isaiah Architecture, the new VIA Nano™ processor is a next-generation x86 processor that sets the standard in power efficiency for tomorrow’s immersive internet experience. With advanced power and thermal management features helping to make it the world’s most energy efficient x86 processor architecture, the VIA Nano processor also boasts ultra modern functionality, high-performance computation and media processing, and enhanced VIA PadLock™ hardware security features. Augmenting the VIA C7® family of processors, the VIA Nano processor’s pin compatibility extends the VIA processor platform portfolio, enabling OEMs to offer a wider range of products for different market segments, and furnishing them with the ability to upgrade device performance without incurring the time and cost expense associated with system redesign.
    [Show full text]
  • USER's MANUAL of VIA CN700 Chipset & VIA VT8237R Plus Chipset
    USER'S MANUAL Of VIA CN700 Chipset & VIA VT8237R Plus Chipset M/B For VIA C7™ processor family NO. G03-7F2WE-F Rev:1.0 Release date: April 2006 Trademark: * Specifications and Information contained in this documentation are furnished for information use only, and are subject to change at any time without notice, and should not be construed as a commitment by manufacturer. Environmental Protection Announcement Do not dispose this electronic device into the trash while discarding. To minimize pollution and ensure environment protection of mother earth, please recycle. i TABLE OF CONTENT USER’S NOTICE.....................................................................................................................iii MANUAL REVISION INFORMATION ..............................................................................iii ITEM CHECKLIST ................................................................................................................iii CHAPTER 1 INTRODUCTION OF MOTHERBOARD 1-1 FEATURE OF MOTHERBOARD ..........................................................................1 1-2 SPECIFICATION .....................................................................................................2 1-3 LAYOUT DIAGRAM & JUMPER SETTING.......................................................3 CHAPTER 2 HARDWARE INSTALLATION 2-1 HARDWARE INSTALLATION STEPS ................................................................5 2-2 CHECKING MOTHERBOARD'S JUMPER SETTING......................................5 2-3 GLOSSARY ...............................................................................................................7
    [Show full text]
  • An Implementation of AES Algorithm on Multicore Processors for High Throughput
    บทความวจิ ยั –วชาการิ การประชุมวชาการิ งานวิจยั และพฒนาเชั ิงประยกตุ ์ คร้ังที่ 6 การพฒนาเทคโนโลยั เพี ื่อให้โลกมีสนตั ิสุข ECTI-CARD Proceedings 2014, Chiang Mai, Thailand An implementation of AES algorithm on multicore processors for high throughput Supachai Thongsuk1, Prabhas Chongstitvatana, Ph.D. 2 Department of Computer Engineering Faculty of Engineering, Chulalongkorn University Bangkok, Thailand E-mail: [email protected], [email protected] Abstract Block of data input is 128 bits or 4 words in 4x4 square matrix of AES (Advanced Encryption Standard) algorithm is a block bytes. The 4x4 matrix of bytes is called the state. The number of encryption algorithm established by the U.S. National Institute of iterations depends on the key length. (Table 1) Standards and Technology (NIST) in 2001. It has been adopted by many AES steps data security systems and now used worldwide. Most of AES 1) Key expansion -- Round keys are derived from the cipher key. Each implementations are for single-core processors. To achieve high round requires a separate key block. performance for large data, this work proposed an AES algorithm for multi-core processors. Using parallelism inherent in large data, all 2) Initial round -- Each byte of the state is bitwise XOR with the round cores are working concurrently to speed up the task. key. Keywords: cryptography; AES; Multicore processor; 3) Rounds -- A round consisted of four transformations: SubBytes, ShiftRows, MixColumns, AddRoundKey. 1. Introduction The information security has become an important concern today 4) Final round -- Three transformations: SubBytes, ShiftRows, due to popular use of computers. The AES algorithm is a standard AddRoundKey.
    [Show full text]