Abstract | ||
---|---|---|
With the increasing needs of security, cryptographic functions have been exploited in network devices. Besides time consuming, security protocols are flexible in algorithm selections. Fortunately, network processors, which serve as the backbone of intelligent network devices, hold performance and flexibility at the same time. In this article, we investigate several principles that can be used with implementing and optimizing cpptographic algorithms on network processors. Also, these principles are applied in real life algontltms, including stream ciphers, block ciphers and digital signatures. Related experiments and benchmark results on Intel LYPl200 network processor are provided. |
Year | DOI | Venue |
---|---|---|
2004 | 10.1109/MM.2004.54 | IEEE Micro |
Keywords | Field | DocType |
network processors,similar component,intel ixp2800 network processor,cryptographic algorithms,optimization.,analyzes architectural characteristic,optimization principle,overall performance,widespread cryptographic algorithm,network processor,digital signature,cryptography,benchmark testing,computer architecture,stream cipher,multi threading,block cipher,parallel algorithms,security protocol,intelligent network | Network processor,Cryptographic protocol,Computer science,Cryptography,Parallel computing,Algorithm,Cryptographic primitive,Application domain,Security of cryptographic hash functions,Benchmark (computing),Communications security | Journal |
Volume | Issue | ISSN |
24 | 5 | 0272-1732 |
Citations | PageRank | References |
10 | 1.32 | 10 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhangxi Tan | 1 | 164 | 12.26 |
Chuang Lin | 2 | 3040 | 390.74 |
Hao Yin | 3 | 777 | 84.39 |
Bo Li | 4 | 815 | 55.93 |