期刊文献+

基于多核处理器的高性能IPSec软件架构的研究 被引量:3

Research for High Performance IPSec Software Architecture on Multi-core Processors
下载PDF
导出
摘要 随着网络的发展,高性能的安全应用在构建未来网络系统中发挥着越来越重要的作用;同时,基于网络处理器成功构建一个安全网络系统的关键,在于网络处理器软件系统的设计与开发,其核心问题就是要安全软件系统充分发挥网络处理器灵活性和高性能的特点.针对目前最为先进的OCTEON基于M IPS64的多核处理器,结合多核技术设计了高性能的IPSec软件架构并进行验证,给出了基于选定硬件平台上的IPSec的测试方案和性能数据. With the network development, high performance security application plays more important roles in the network systems. Network processors satisfy the demand for intelligent processing at wire speed and system flexibility. The paper presents the outline of design and challenges which a designer may face while designing high performance IPSec system using network processors. It introduces the hardware architecture of multi-core network processor and software framework of IPSec. The OCTEON is selected which is a fully capable microprocessor SOC implementing the MIPSv264-bit instruction set with security and packet processing instructions forming the cnMIPS core to verify the IPSec software architecture. At last, the IPSec performance data are given.
出处 《武汉理工大学学报(交通科学与工程版)》 2007年第5期792-795,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 国家自然科学基金项目(批准号:60672137) 教育部高等学校博士点基金项目(批准号:20060497015) 湖北省科技攻关项目(批准号:2007AA101C63)资助
关键词 IPSEC 多核网络处理器 数据平面 快速通道 IPSec multi-core NP data plane fastpath
  • 相关文献

参考文献5

二级参考文献53

  • 1蒋屹新,林闯,曲扬,尹浩.基于Petri网的模型检测研究[J].软件学报,2004,15(9):1265-1276. 被引量:20
  • 2RFC 3664. The AES-XCBC-PRF-128 algorithm for the internet key exchange protocol (IKE)[S]. 2004.
  • 3Linux FreeS/WAN[EB/OL].http://www. freeswan.org/.
  • 4IPv6 enabled FreeS/WAN IPSec Implementation[EB/OL].http://www.eurescom.de/-public-web-deliverables/P1100-series/P1113/D1/41 freeswan.html.
  • 5[1]Rohatgi P.A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication.In 6th ACM Conference on Computer and Communication Security,1999-11
  • 6[2]Gennaro R,Rohatgi P.How to Sign Digital Streams.In Advances in Cryptology CRYPTO,1997:180~197
  • 7[3]Perrig A.Dawn Song, Doug Tygar, and Ran Canetti.Efficient Authentication and Signature of Multicast Streams over Lossy Channels.In 2000 IEEE Symposium on Security and Privacy,2000-05
  • 8[4]Wong C K,Lam S.Digital Signatures for Flows and Multicasts.In IEEE/ACM Transactions on Networking,1999(7):502~513
  • 9[5]Golle P and Modadugu N.Authenticating Streamed Data in the Presence of Random Packet Loss.In ISOC Network and Distributed System Security Symposium,2001:13~22
  • 10卢开澄.计算机密码学(第二版)[M].北京:清华大学出版社,1998..

共引文献59

同被引文献10

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部