Association Block

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 33912 Experts worldwide ranked by ideXlab platform

Jang-hee Yoo - One of the best experts on this subject based on the ideXlab platform.

  • Implementation of 10 Giga VPN accelerator board
    2006 8th International Conference Advanced Communication Technology, 2006
    Co-Authors: Ki Hyun Kim, Jang-hee Yoo, Kyo Il Chung
    Abstract:

    This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange Block, and security Association Block, IPsec engine Block. The Internet key exchange Block negotiates crypto algorithm and key used in IPsec engine Block. Security Association Blocks setting-up and manages security Association information. IPsec engine Block treats IPsec packets and consists of networking functions for communication. The IPsec engine Block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode.

  • Implementation of10GigaVPNAccelerator Board
    2006
    Co-Authors: Jang-hee Yoo
    Abstract:

    Thispaperproposes aVPNAccelerator Board todoRouting necessary amount ofworkdonebecause increase (VPN-AB), avirtual private network (VPN)protocol designed for greatly be.Therefore, Trade-Off always exists between security trust channel security system (TCSS). TCSSsupports safetyandspeed(1). A recent security processors offer uservarious communication channel between security nodesininternet. It function andveryfast performance. Thesehighspeedsecurity furnishes authentication, confidentiality, integrity, andaccessprocessors becomeaitemthat isessential tonetwork security control tosecurity nodetotransmit datapackets withIPsec system thatbigwidth-band isrequired. Information protection protocol. TCSS consists ofinternet keyexchangeBlock,and security Association Block, IPsecengine Block. Theinternet key technology suchasVPN, Firewall, IDS(Intrusion Detecton exchange Blocknegotiates crypto algorithm andkeyusedinIPsec System)etc. aredeveloped variously withnetworksecurity engine Block. Security Association Blocks setting-up andmanagesequipments. Recently, equipments integrated bytechnologies security Association information. IPsec engine Block treats IPsecmorethantwoareannounced. We propose aVPN acceleration packets andconsists ofnetworking functions forcommunication. boardfortrust channel security system tobeusedinrouter, TheIPsec engine Block should beembodied byH/Wandin-line gateway, andnetwork devices (9), (10). modetransaction forhigh speed IPsec processing. OurVPN-ABis Therestofthepaperisstructured asfollows. Section 2 implemented withhighspeed security processor thatsupportsprovides astructure ofTCSS.Detail unit functions ofthesystem manycryptographic algorithms andin-line mode. We evaluate a anddataflowarepresented. Insession 3,architecture of smallTCSS communication environment, and measurea . ' performance ofVPN-ABintheenvironment. TheexperimentVpN-ABrin es,and ashow theboard Epreent, results showthatVPN-ABgetsaperformance throughput of performance, andaninvestigation oftest result arepresented in maximum15.645Gbps whenwe settheIPsecprotocol with session4. Finally, conclusion iswritten insession 5. 3DES-HMAC-MD5tunnel mode.

Reston Black Focus - One of the best experts on this subject based on the ideXlab platform.

Kyo Il Chung - One of the best experts on this subject based on the ideXlab platform.

  • Implementation of 10 Giga VPN accelerator board
    2006 8th International Conference Advanced Communication Technology, 2006
    Co-Authors: Ki Hyun Kim, Jang-hee Yoo, Kyo Il Chung
    Abstract:

    This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange Block, and security Association Block, IPsec engine Block. The Internet key exchange Block negotiates crypto algorithm and key used in IPsec engine Block. Security Association Blocks setting-up and manages security Association information. IPsec engine Block treats IPsec packets and consists of networking functions for communication. The IPsec engine Block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode.

Ki Hyun Kim - One of the best experts on this subject based on the ideXlab platform.

  • Implementation of 10 Giga VPN accelerator board
    2006 8th International Conference Advanced Communication Technology, 2006
    Co-Authors: Ki Hyun Kim, Jang-hee Yoo, Kyo Il Chung
    Abstract:

    This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange Block, and security Association Block, IPsec engine Block. The Internet key exchange Block negotiates crypto algorithm and key used in IPsec engine Block. Security Association Blocks setting-up and manages security Association information. IPsec engine Block treats IPsec packets and consists of networking functions for communication. The IPsec engine Block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode.

Wooyong Han - One of the best experts on this subject based on the ideXlab platform.

  • ICICS - Design of a security platform for CORBA based application
    Information and Communications Security, 1997
    Co-Authors: Rakman Choi, Kwonil Lee, Eun-mi Kim, Wooyong Han
    Abstract:

    This paper proposes a security platform, SCAP(Security platform for CORBA based APplication), to cope with potential threats in a distributed object system. SOAP supports CORBA security specification announced by OMG. SOAP is composed of four functional Blocks which co-work with ORB to provide security services: Authentication Block, Security Association Block, Access Control Block, and Security Information Management Block. It is designed to support Common Secure Interoperability functionality level 2 which is useful for large scale intra- or inter-enterprise network based applications. Actual security services which are dependent on supporting security technology will be provided as external security services for replaceability. Implementation issues such as how to simulate an interceptor mechanism using a commercial ORB product without source code, and how to extend Current object required for security services are also described.