ABSTRACT
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost. In this paper we argue that recent advances in the implementation of cryptographic algorithms can make general purpose processors capable of encrypting packets at line rates. This implies that the Internet can be gradually transformed to an information delivery infrastructure where all traffic is encrypted and authenticated. We justify our claim by presenting technologies that accelerate end-to-end encryption and authentication by a factor of 6 and a high performance TLS 1.2 protocol implementation that takes advantage of these innovations. Our implementation is available in the public domain for experimentation.
References
- "Advanced Encryption Standard". Website. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.Google Scholar
- "Cisco WebVPN Services Module - Cryptographic Accelerator". Website, hardware.com. http://us.hardware.com/store/cisco/WS-SVC-WEBVPN-K9=/campaign/1-85819001.Google Scholar
- "Crypto++". Crypto++ Website. http://www.cryptopp.com.Google Scholar
- "Data-stealing Malware on the Rise, Solutions to Keep Businesses and Consumers Safe". Website. http://us.trendmicro.com/imperia/md/content/us/pdf/ threats/securitylibrary/data_stealing_malware_focus_ report_-_june_2009.pdf.Google Scholar
- The Galois/Counter Mode of Operation (GCM). Website, NIST. http://csrc.nist.gov/groups/ST/toolkit/BCM/ documents/proposedmodes/gcm/gcm-spec.pdf.Google Scholar
- "Intel AVX, Intel Software Network". Intel Website. http://software.intel.com/en-us/avx/.Google Scholar
- "Internet Passes 600,000 SSL Sites". Website, SSL Shopper. http://www.sslshopper.com/ article-internet-passes-600000-ssl-sites.html/.Google Scholar
- "OpenSSL Library". OpenSSL Website. http://www.openssl.org.Google Scholar
- "OProfile". OProfile Website. http://oprofile.sourceforge.net/news/.Google Scholar
- "PowerEdge Rack Servers". Website, dell.com. http://www.dell.com/us/en/gen/servers/rack_ optimized/cp.aspx?refid=rack_optimized&s=gen.Google Scholar
- "SSL Acceleration and Offloading: What Are the Security Implications?". Website, WindowSecurity.com. http://www.windowsecurity.com/articles/SSL-Acceleration-Offloading-Security-Implications.html.Google Scholar
- "SSL Decryption and Re-encryption". Website, zeus.com. http://www.zeus.com/products/traffic-manager/secure/ssl.html.Google Scholar
- "The Total Number of Web Sites on Earth". Website, Get Netted. http://www.wlug.net/the-total-number-of-websites-on-earth/.Google Scholar
- "TLS 1.2 Open Source Release". Website. http://www.mail-archive.com/[email protected]/msg27172.html.Google Scholar
- "Two Year Study of Global Internet Traffic, NANOG47". Website, Internet Society. http://isoc-dc.org/wordpress/?p=920.Google Scholar
- P. Barrett. "Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor". Masters Thesis, University of Oxford, UK, 1986.Google Scholar
- A. Bosselaers, R. Govaerts, and J. Vandewalle. "Comparison of Three Modular Reduction Functions". Proceedings, Advances in Cryptology (CRYPTO 1993), 1993. Google Scholar
Digital Library
- D. Canright. "A Very Compact S-Box for AES". Proceedings, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005), 2005. Google Scholar
Digital Library
- A. J. Elbirt. "Fast and Efficient Implementation of AES via Instruction Set Extensions". Proceedings, 21st International Conference on Advanced Information Networking and Applications Workshops, 2007. Google Scholar
Digital Library
- N. Farrell. "google tightens Gmail security". Website, January 2010. http://www.theinquirer.net/inquirer/ news/1586138/google-tightens-gmail-security.Google Scholar
- M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. "AES Implementation on a Grain of Sand". IEE Proceedings on Information Security, 2005.Google Scholar
Cross Ref
- D. Feldmeier. "Fast Software Implementation of Error Detection Codes". IEEE Transactions on Networking, pages 640--651, 1995. Google Scholar
Digital Library
- A. M. Fiskiran and R. B. Lee. "On Chip Lookup Tables for Fast Symmetric Key Encryption". Proceedings, IEEE International Conf. on Application-Specifoc Systems, Architectures and Processors, pages 356--363, 2005. Google Scholar
Digital Library
- K. Grewal and M. Miller. "Next Generation Scalable, Cost-e ective E2E Security". RSA Conference, 2010.Google Scholar
- S. Gueron. "Intel's New AES Instructions for Enhanced Performance and Security". Proceedings, 16th International Workshop on Fast Software Encryption (FSE 2009), LNCS 5665, pages 51 -- 66, 2009. Google Scholar
Digital Library
- A. Hodjat, D. Hwang, B.-C. Lai, K. Tiri, and I. Verbauwhede. "A 3.84 Gbits/s AES Crypto Coprocessor with Modes of Operation in a 0.18-um CMOS Technology". Proceedings, 15th ACM Great Lakes Symposium on VLSI, pages 60--63, 2005. Google Scholar
Digital Library
- A. Hodjat and I. Verbauwhede. "A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA". Proceedings, 12th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2004), pages 308--309, 2005. Google Scholar
Digital Library
- D. Knuth. "Seminumerical Algorithms". The Art of Computer Programming, Addison-Wesley, 2, 1997. Google Scholar
Digital Library
- C. K. Koc. "Analysis of Sliding Window Techniques for Exponentiation". Computers and Mathematics with Application, 30(10):17--24, 1995.Google Scholar
Cross Ref
- C. K. Koc, T. Acar, and B. S. Kaliski. "Analyzing and Comparing Montgomery Multiplication Algorithms". IEEE Micro, 16(3):26--33, 1996. Google Scholar
Digital Library
- M. Kounavis. "A New Method for Fast Integer Multiplication and its Application to Cryptography". Proceedings, 2007 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2007.Google Scholar
- M. Kounavis and L. Xu. "AES-NI: New Technology for Improving Encryption Efficiency and Enhancing Data Security in the Enterprise Cloud". Intel Developer Forum, 2009. https://intel.wingateweb. com/us09/scheduler/sessions.do?searchGroup= 9&searchGroupID=10133&profileItem_id=10004.Google Scholar
- D. McGrew. "An Interface and Algorithms for Authenticated Encryption". Website, January 2008. http://www.faqs.org/rfcs/rfc5116.html.Google Scholar
- A. Menezes, P. Oorschot, and S. Vanstone. "Handbook of Applied Cryptography". CRC Press, 1997. Google Scholar
Digital Library
- N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede. "A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box". Proceedings of CT-RSA 2005, 2005. Google Scholar
Digital Library
- P. Montgomery. "Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor". Masters Thesis, University of Oxford, UK, 1986.Google Scholar
- P. Montogomery. "Five, Six and Seven-term Karatsuba-like Formulae". IEEE Transactions on Computers, 2005. Google Scholar
Digital Library
- S. Moriokah and A. Satoh. "An Optimized S-Box Circuit Architecture for Low Power AES Design". Proceedings, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002), pages 172--186, May 2002. Google Scholar
Digital Library
- K. K. Peretti. "Data Breaches: What the Underground World of Carding Reveals". the Santa Clara Computer and High Technology Journal, 25(2):375--413, January 2009.Google Scholar
- C. Rebeiro, D. Selvakumar, and A. S. L. Devi. "Bitslice Implementation of AES". Cryptology and Network Security, LNCS 4301, 2006. Google Scholar
Digital Library
- A. Rudra, P. K. Dubey, C. S. Jutla, V. Kumar, J. R. Rao, and P. Rohatgi. "Efficient Rijndael Encryption with Composite Field Arithmetic". Proceedings, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2001), pages 175--188, May 2001. Google Scholar
Digital Library
- A. Satoh, S. Moriokah, K. Takano, and S. Munetoh. "A Compact Rijndael Hardware Architecture with SBox Optimization". Lecture Notes in Computer Science, LNCS 2248, pages 239--254, 2001. Google Scholar
Digital Library
- S. Schillace. "Default HTTPS Access for gmail". Website, January 2010. http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html.Google Scholar
- SecurityFocus. "Data Breach Costs Rise, Response Costs Fall". Website, February 2009. http://www.securityfocus.com/brief/900.Google Scholar
- I. Verbauwhede, P. Schaumont, and H. Kuo. "Design and Performance Testing of a 2.29 Gb/s Rijndael Processor". IEEE Journal of Solid-State Circuits, pages 569--572, 2003.Google Scholar
Cross Ref
- A. Weimerskirch and C. Paar. "Generalizations of the Karatsuba Algorithm for Efficient Implementations. Technical Report, University of Ruhr, Bochum, Germany, 2003.Google Scholar
- A. Whitten. "HTTPS Security for Web Applications". Website, June 2009. http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web-applications.html.Google Scholar
- J. Wolkerstorfer, E. Oswald, and M. Lamberger. "An ASIC Implementation of the AES SBoxes". Proceedings, CT-RSA 2002, 2002. Google Scholar
Digital Library
Index Terms
Encrypting the internet






Comments