In this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We showed that even when using a cryptographic SHA-3 hash function, the probe uses less than 17% of the available FPGA resources, offering a throughput of over 20 Gbit/s. We have also researched the problem of choosing an optimal hash function to be used in a network probe for addressing network flows in a flow cache. In our work we compared five 32-bit hash functions, including two cryptographic ones: SHA-1 and SHA-3. We ran a series of experiments with various hash functions, using traffic replayed f...
This paper describes the results of an extensive study and comparison of popular hash functions SHA-...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage i...
A broad spectrum of network measurement applications demand passive multipoint measurements in which...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...
Many devices currently connect to the internet. Some are pretty well secured, while others lack secu...
Billions of legitimate packets traverse computer networks every day. Unfortunately, malicious traffi...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
High-throughput designs of hash functions are strongly demanded due to the need for security in ever...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
A key function for network traffic monitoring and analysis is the ability to perform aggregate queri...
This paper presents a comparative study involving SHA-3 final round candidates along with recent ver...
International audienceIn recent years, the progress in both hardware and software allows user-space ...
Network speeds and bandwidths have improved over time. However, the frequency of network attacks and...
This paper describes the results of an extensive study and comparison of popular hash functions SHA-...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage i...
A broad spectrum of network measurement applications demand passive multipoint measurements in which...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...
Many devices currently connect to the internet. Some are pretty well secured, while others lack secu...
Billions of legitimate packets traverse computer networks every day. Unfortunately, malicious traffi...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
High-throughput designs of hash functions are strongly demanded due to the need for security in ever...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
A key function for network traffic monitoring and analysis is the ability to perform aggregate queri...
This paper presents a comparative study involving SHA-3 final round candidates along with recent ver...
International audienceIn recent years, the progress in both hardware and software allows user-space ...
Network speeds and bandwidths have improved over time. However, the frequency of network attacks and...
This paper describes the results of an extensive study and comparison of popular hash functions SHA-...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage i...