editor's blog
Subscribe Now

More Than Encyption and Decryption

The proliferation of nosy and evil people has made internet security increasingly important. I know… that sounds harsh, but it’s true… Why else would we keep hearing about data debacles? And this means that we’ve got to scramble all of our data before sending it so that someone can’t read or hijack it.

Which means encrypting and decrypting all data. And that’s compute-intensive. Which is why it’s almost always hardware-accelerated.

But there’s still effort involved in managing the security engine that does the encryption and decryption. Done at its simplest, a host receives a packet and sends it for decryption; when complete, the host can continue. The host is idle during that time, except for any other tasks the OS might toss in.

Elliptic has released a multi-packet manager that frees the host up from its need to micro-manage the security engine. Instead of working with one packet at a time, the host builds a linked list of packets to be encrypted or decrypted. When it gets a packet that needs security engine attention, it builds a packet descriptor including things like data and key location; that descriptor is attached to the list.

Instead of feeding the security engine each packet, the host now just points the security engine manager to the start of the list, and it can work all the way through to the end. The host can keep adding new packet descriptors to the end of the list while the engine works further up the list. Keys are cached to reduce fetch times.

The intent is that, by abstracting what the host has to worry about up one level, the host can get more done and let the security engine manager worry about the details that it used to have to handle.

More information in their release

Leave a Reply

featured blogs
Jun 20, 2018
https://youtu.be/-fwwmFE6yUs Coming from Automotiv Elektronik Kongress (camera Robert Schweiger) Monday: Embargoed Tuesday: DAC day 1 Wednesday: DAC day 2 Thursday: DAC day 3 Friday: Embargoed www.breakfastbytes.com Sign up for Sunday Brunch, the weekly Breakfast Bytes email....
Jun 19, 2018
Blockchain. Cryptocurrencies. Bitcoin mining. Algorithmic trading. These disruptive technologies depend on high-performance computing platforms for reliable execution. The financial services industry invests billions in hardware to support the near real-time services consumer...
Jun 7, 2018
If integrating an embedded FPGA (eFPGA) into your ASIC or SoC design strikes you as odd, it shouldn'€™t. ICs have been absorbing almost every component on a circuit board for decades, starting with transistors, resistors, and capacitors '€” then progressing to gates, ALUs...
May 24, 2018
Amazon has apparently had an Echo hiccup of the sort that would give customers bad dreams. It sent a random conversation to a random contact. A couple had installed numerous Alexa-enabled devices in the home. At some point, they had a conversation '€“ as couples are wont to...
Apr 27, 2018
A sound constraint management design process helps to foster a correct-by-design approach, reduces time-to-market, and ultimately optimizes the design process'€”eliminating the undefined, error-prone methods of the past. Here are five questions to ask......