SECURE EMBEDDED PROCESSORS full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar presentation
Active In SP
**

Posts: 582
Joined: Apr 2010
#1
21-05-2010, 11:35 PM



.doc   SECURE EMBEDDED PROCESSORS.doc (Size: 263.5 KB / Downloads: 80)

CHAPTER 1 : INTRODUCTION

As networks incorporate more and more devices and span multiple location effectively removing the network perimeter they become increasingly vulnerable to threats. Such threats include theft of confidential data hacks and malicious code -providing unguarded entry into corporate networks and IT systems. To provide high performance security solutions that protect data, application and infrastructure equipment manufacturers are trying to integrate security solutions even-at the chip level. This need has led to the development of a new class of chip known as secure embedded processors which integrates the security functions and embedded processor in a system-on-chip fashion
While dedicated processors have be employed widely in communication equipment over the last few years to ensure maximum protection of data, both enterprise and SOHO customers are demanding security be embedded in the networking devices. This need can be satisfied by the use of secure embedded processors, which can be embedded in the devices directly. And a high performance boost and stronger security solution over the current stand-alone security processors
Various security protocols included in the security systems are added to the secure embedded processors so that the complete security functions can be off loaded from the host processors. So that it integrates protocol intelligent hardware to a processor The growing need to better protect data communications, while enabling high performance network systems, has driven the demand for a wide range of security processors and secure processors, from stand-alone security coprocessors to protocol-hardened security engines, which have become an essential part of integrated communication processors.

CHAPTER 2 : REQIURMENTS OF NETWORK SECURITY

The basic requirements of network security are
1. Confidentiality: The data that the user exchange must be prevented from eavesdropping
2. Integrity: The data that is transferred across the network should be prevented from modification
3. Authentication: Identities need to be protected to make sure that information is only exchanged between the intended persons or entities, and that information or service is only available to the users who have appropriate rights to access it
To meet this requirement for secure data communication organization deploy a wide range of security measures in their network devices
Typical services that use security measures include
1 Enterprise and Access switches and router products
2 Office automation solution and printers
3 VPN and SSL services
4 Intrusion detection and prevention appliances
5 Storage area and network devices

CHAPTER 3 : FIRST LINE OF DEFENSE

Encryption: In order to secure networks appropriate measures have to be taken such as new firewall and Intrusion prevention systems that identifies and prevent attacks. As more and more data is transferred through the network encryption of all data becomes important .All systems rely on cryptography to ensure confidentiality, authorization, and authentication. And data integrity of communication over potentially unsafe networks such as Internet. Encryption is the foundation for all higher-level security protocols such as Internet Security Protocol, Secure Sockets Layer, Secure Multi Protocol Layer Protocol

Various cryptographic algorithms have been invented and employed to address the increasing demand for the security. Hashing algorithms such as SHA-256 help preserve the data integrity are used for digital signatures Public key algorithm is mainly used for key generation exchange key confidentiality, signing and signature verification while symmetric algorithms are mainly used for data confidentiality


CHAPTER 4 : GENERAL APPROACHES FOR IMPLEMENTING SECURITY

Generally security can be implemented in a system by different methods. The basics methods are defined below
1. Run security software on a general purpose processors
2. Employ a separate security co-processors
3. Using a single integrated devices known as security enabled processors
The above mentioned methods have its own drawbacks software algorithms are generally computation intensive Symmetric encryption and decryption technologies require many bit manipulation operation .Software running on a general processor is often inefficient in performing such operation. The many instruction needed to implement cryptographic operation consume valuable CPU resources. There by adversely affecting the system performance and scalability. Executing security algorithms on a general purpose processor will only be done in a client type situation where a single interactive session is being secured.


CHAPTER 5 : IMPROVEMENTS FOR SECURITY ALGORITHM

The more effective alternative to software is cryptographic hardware acceleration in silicon. Dedicated hardware allows for efficient, high-performance implementations of cryptographic operations; the hardware logic is specifically designed to perform the cryptographic algorithms, thereby greatly outperforming software. While a general-purpose processor requires many instructions to implement an operation using general-purpose hardware blocks (such as an adder or a shift register), dedicated hardware crypto implementations only use the silicon cells that are strictly needed to perform the cryptographic operation. The efficiency of dedicated hardware also brings along the advantage of reduced power consumption.
Another important benefit of hardware implementations is reduced vulnerability. While it may not be very difficult to alter security software running on a general purpose processor, it is far more complex and expensive to tamper with a cryptographic security engine embedded in a chip. In a very simple scenario, the hardware accelerators only implement basic cryptographic operations and operate under full control of an external host processor. The general purpose (host) processor is freed to focus on data processing, communications and exchanging information, such as commands, status, keys, initialization vectors, state information, as well as input and output data with the hardware accelerator.
Several alternatives and improvements exist for the scenario described above. First of all, the system can enable more efficient communications with the hardware accelerator by allowing DMA and burst accesses. The host processor therefore doesn
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 8,922 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  secure atm by image processing jaseelati 0 274 10-02-2015, 01:33 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 341 23-01-2015, 03:08 PM
Last Post: jaseelati
  embedded web technology ppt jaseelati 0 497 16-12-2014, 04:34 PM
Last Post: jaseelati
  android full report computer science technology 57 73,126 24-09-2014, 05:05 PM
Last Post: Michaelnof
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,299 13-09-2014, 02:35 PM
Last Post: Radhika.m
  steganography full report project report tiger 23 25,732 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,341 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,392 10-05-2014, 09:44 AM
Last Post: seminar project topic
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 30,948 08-04-2014, 07:07 AM
Last Post: Guest