editor's blog
Subscribe Now

More Than Encyption and Decryption

The proliferation of nosy and evil people has made internet security increasingly important. I know… that sounds harsh, but it’s true… Why else would we keep hearing about data debacles? And this means that we’ve got to scramble all of our data before sending it so that someone can’t read or hijack it.

Which means encrypting and decrypting all data. And that’s compute-intensive. Which is why it’s almost always hardware-accelerated.

But there’s still effort involved in managing the security engine that does the encryption and decryption. Done at its simplest, a host receives a packet and sends it for decryption; when complete, the host can continue. The host is idle during that time, except for any other tasks the OS might toss in.

Elliptic has released a multi-packet manager that frees the host up from its need to micro-manage the security engine. Instead of working with one packet at a time, the host builds a linked list of packets to be encrypted or decrypted. When it gets a packet that needs security engine attention, it builds a packet descriptor including things like data and key location; that descriptor is attached to the list.

Instead of feeding the security engine each packet, the host now just points the security engine manager to the start of the list, and it can work all the way through to the end. The host can keep adding new packet descriptors to the end of the list while the engine works further up the list. Keys are cached to reduce fetch times.

The intent is that, by abstracting what the host has to worry about up one level, the host can get more done and let the security engine manager worry about the details that it used to have to handle.

More information in their release

Leave a Reply

featured blogs
Sep 27, 2020
https://youtu.be/EUDdGqdmTUU Made in "the Alps" Monday: Complete RF Solution: Think Outside the Chip Tuesday: The First Decade of RISC-V: A Worldwide Phenomenon Wednesday: The European... [[ Click on the title to access the full blog on the Cadence Community site. ...
Sep 25, 2020
What do you think about earphone-style electroencephalography sensors that would allow your boss to monitor your brainwaves and collect your brain data while you are at work?...
Sep 25, 2020
Weird weather is one the things making 2020 memorable. As I look my home office window (WFH – yet another 2020 “thing”!), it feels like mid-summer in late September. In some places like Key West or Palm Springs, that is normal. In Pennsylvania, it is not. My...
Sep 25, 2020
[From the last episode: We looked at different ways of accessing a single bit in a memory, including the use of multiplexors.] Today we'€™re going to look more specifically at memory cells '€“ these things we'€™ve been calling bit cells. We mentioned that there are many...

Featured Video

AI SoC Chats: IP for In-Memory / Near-Memory Compute

Sponsored by Synopsys

AI chipsets are data hungry and have high compute intensity, leading to potential power consumption issues. Join Synopsys Fellow Jamil Kawa to learn how in-memory or near-memory compute, 3D stacking, and other innovations can address the challenges of making chips think like the human brain.

Click here for more information about DesignWare IP for Amazing AI

Featured Paper

The Cryptography Handbook

Sponsored by Maxim Integrated

The Cryptography Handbook is designed to be a quick study guide for a product development engineer, taking an engineering rather than theoretical approach. In this series, we start with a general overview and then define the characteristics of a secure cryptographic system. We then describe various cryptographic concepts and provide an implementation-centric explanation of physically unclonable function (PUF) technology. We hope that this approach will give the busy engineer a quick understanding of the basic concepts of cryptography and provide a relatively fast way to integrate security in his/her design.

Click here to download the whitepaper

Featured Chalk Talk

Digi Remote Manager

Sponsored by Mouser Electronics and Digi

With the complexity of today’s networks, the proliferation of IoT, and the increase in remote access requirements, remote management is going from “nice to have” to “critical” in network design and deployment. In this episode of Chalk Talk, Amelia Dalton chats with Stefan Budricks of Digi International about how Digi Remote Manager can address your remote management and security needs.

Click here for more information about DIGI XBee® Tools