2021
DOI: 10.1007/978-3-030-69255-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Accelerated Cryptography for Software-Defined Networks with P4

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Same ideas are applied to P4-MACsec by the same authors. Other works that rely on externs include [193,194].…”
Section: ) Cryptography Schemes Comparison Discussion and Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Same ideas are applied to P4-MACsec by the same authors. Other works that rely on externs include [193,194].…”
Section: ) Cryptography Schemes Comparison Discussion and Limitationsmentioning
confidence: 99%
“…Malina et al [193] presented a solution where P4 programs invoke cryptographic functions (externs) written in VHDL on FPGAs. The goal of this work is to avoid coding cryptographic functions on hardware (VHDL), and thus enables rapid prototyping of in-network applications with security functions.…”
Section: ) External Cryptographymentioning
confidence: 99%
“…Netcope P4 is used is used in this solution to generate firmware. Its detailed description is available in [4],…”
Section: Summary Of Main Technologies Used In the Solution Of This Papermentioning
confidence: 99%
“…The advantage of GCM mode is that it provides both features -encryption/decryption and authentication. The AES_256_GCM module uses four main components: Encryption, Decryption, Expansion and GCM [4].…”
Section: Aes 256 Gcmmentioning
confidence: 99%
“…Our SHA-3 component implementation consists of two subcomponents: the Padding Block (the input message alignment) and the Hash Block (the Keccak function core). The input (a message) and output data width (a hash) are 512 bits [5,7].…”
Section: Hash Function Sha-3mentioning
confidence: 99%