editor's blog
Subscribe Now

More Than Encyption and Decryption

The proliferation of nosy and evil people has made internet security increasingly important. I know… that sounds harsh, but it’s true… Why else would we keep hearing about data debacles? And this means that we’ve got to scramble all of our data before sending it so that someone can’t read or hijack it.

Which means encrypting and decrypting all data. And that’s compute-intensive. Which is why it’s almost always hardware-accelerated.

But there’s still effort involved in managing the security engine that does the encryption and decryption. Done at its simplest, a host receives a packet and sends it for decryption; when complete, the host can continue. The host is idle during that time, except for any other tasks the OS might toss in.

Elliptic has released a multi-packet manager that frees the host up from its need to micro-manage the security engine. Instead of working with one packet at a time, the host builds a linked list of packets to be encrypted or decrypted. When it gets a packet that needs security engine attention, it builds a packet descriptor including things like data and key location; that descriptor is attached to the list.

Instead of feeding the security engine each packet, the host now just points the security engine manager to the start of the list, and it can work all the way through to the end. The host can keep adding new packet descriptors to the end of the list while the engine works further up the list. Keys are cached to reduce fetch times.

The intent is that, by abstracting what the host has to worry about up one level, the host can get more done and let the security engine manager worry about the details that it used to have to handle.

More information in their release

Leave a Reply

featured blogs
Jul 3, 2020
[From the last episode: We looked at CNNs for vision as well as other neural networks for other applications.] We'€™re going to take a quick detour into math today. For those of you that have done advanced math, this may be a review, or it might even seem to be talking down...
Jul 2, 2020
Using the bitwise operators in general, and employing them to perform masking operations in particular, can be extremely efficacious....
Jul 2, 2020
In June, we continued to upgrade several key pieces of content across the website, including more interactive product explorers on several pages and a homepage refresh. We also made a significant update to our product pages which allows logged-in users to see customer-specifi...

Featured Video

Product Update: DesignWare® TCAM IP -- Synopsys

Sponsored by Synopsys

Join Rahul Thukral in this discussion on TCAMs, including performance and power considerations. Synopsys TCAMs are used in networking and automotive applications as they are low-risk, production-proven, and meet automotive requirements.

Click here for more information about DesignWare Foundation IP: Embedded Memories, Logic Libraries & GPIO

Featured Paper

Cryptography: How It Helps in Our Digital World

Sponsored by Maxim Integrated

Gain a basic understanding of how cryptography works and how cryptography can help you protect your designs from security threats.

Click here to download the whitepaper

Featured Chalk Talk

Embedded Display Applications Innovation

Sponsored by Mouser Electronics and Texas Instruments

DLP technology can add a whole new dimension to your embedded design. If you considered DLP in the past, but were put off by the cost, you need to watch this episode of Chalk Talk where Amelia Dalton chats with Philippe Dollo of Texas Instruments about the DLP LightCrafter 2000 EVM. This new kit makes DLP more accessible and less expensive to design in, and could have a dramatic impact on your next embedded design.

Click here for more information about Texas Instruments DLP2000 Digital Micromirror Device (DMD)