Got a Byte?

Reeling in system-on-a-chip processing helps solve VPN performance problems

UNAUTHORIZED access to networks has recently increased within the past few years, and replacing DoS as the second-most significant contributor to computer crime losses, according to the Computer Security Institute and FBI. Theft of proprietary information also showed a significant increase in average loss per respondent. Both threats can be addressed with virtual private network (VPN) technology to protect data transmissions and access to proprietary data assets. As a result, the market for remote access and site-to-site VPN technologies to secure data transmissions over potentially unsafe networks has grown significantly over the past 10 years.

To meet requirements for secure data communication, organizations deploy a wide range of security measures within networks. Typical network appliances that require strong security include enterprise switch and router products, networked office automation solutions and printers and storage area networking devices.

There are three fundamental requirements for data protection on the network. One is confidentiality. Integrity is another requirement, and the third requirement is authentication and authorization. Identities need to be protected to make sure information is only exchanged between the intended parties, and the information or service is only available to a user if that person has the appropriate rights to access the information or use the service.

To meet requirements for secure data communication, organizations deploy a wide range of security measures within networks. Typical network appliances that require strong security include enterprise switch and router products, networked office automation solutions and printers and storage area networking devices (iSCSI, FC-SP).

With the rise of real-time, data-intensive applications, such as VoIP and streaming video, VPN security technologies, such as IPsec and SSL, have become bottlenecks to the overall performance of business applications.

Security in Silicon
VPN security systems rely on cryptography to ensure confidentiality, authentication and data integrity of communications over potentially unsafe networks. Encryption is the foundation for all security protocols such as Internet protocol security (IPSec), secure sockets layer (SSL) and secure multi-protocol label switching (MPLS).

Various cryptographic algorithms have been developed to address the increasing demand for security. Hashing algorithms, such as SHA-256, help preserve data integrity and are used for digital signatures. Public-key cryptography is mainly used for key generation, exchange, key confidentiality, signing and signature verification. Symmetric crypto algorithms are mainly used for data confidentiality.

Because of the complexity, cryptographic security algorithms are generally computation-intensive. Symmetric encryption and decryption algorithms like DES and Triple-DES require many bit-manipulating operations. Traditional security system designs using cryptographic software running on a general-purpose processor are often inefficient performing the operations. The many instructions needed to calculate cryptographic operations simply overwhelm today's CPUs, adversely affecting overall system performance and scalability, and making software-based cryptography an unsuitable option for high-performance security processing.

The more effective alternative to software is dedicated cryptographic hardware acceleration in silicon. Dedicated hardware allows for efficient, high-performance implementations of cryptographic operations because hardware logic is specifically designed to perform cryptographic algorithms efficiently, greatly outperforming software. While a general-purpose CPU processor requires many instructions to execute a software-based crypto operation, dedicated hardware crypto implementations offload, processing to silicon cells designed to perform only cryptographic operations, greatly improving performance. The efficiency of dedicated hardware also brings the advantage of reduced power consumption compared to software-based crypto.

Another benefit of hardware implementations is reduced vulnerability to security threats. While it may not be very difficult to alter security software running on a general-purpose CPU processor, it is far more complex and expensive to tamper with a cryptographic security engine embedded in a chip.

Small-Packet Challenge
While IPsec security processing of large IP packets (1,500 bytes) has been accelerated to multi-Gigabit performance in many VPN systems, achieving the same performance levels for small packets (64 bytes) has proven to be a challenge. Because the percentage of overhead data and associated packet processing is much higher for a given data stream of small packets than it is for big packets, the performance of small-packet security processing has been a problem for security system designers. And throwing massive computing power at the problem is often not a cost-effective solution.

The architectural bottleneck to higher performance comes from the fact that each packet needs to be processed by a general-purpose CPU before and after it gets offloaded for security processing to the embedded security accelerator. For small packets, this CPU processing burden is higher compared to larger packets. The situation is becoming increasingly critical with the rise of small packets in data traffic, mostly driven by real-time applications such as VoIP.

In traditional VPN security architectures, hardware acceleration is usually limited to dedicated modules/security processors that perform cryptographic security processing under full control of an embedded, general-purpose CPU. In these architectures, the general-purpose processor still needs to process each IP packet.

Especially at high data rates and for small packet sizes, the approach creates a significant burden on the processor, resulting in an overall throughput bottleneck.

Inline Security Processing
The latest development in security processing, and an excellent solution for the small packet performance challenge, is a security architecture that completely, autonomously processes packets inline, offloading security processing to the CPU. In contrast to previous "look-aside" security architectures, the new concept of inline security processing eliminates any data plane processing interaction with the general-purpose CPU core (e.g. packet classification, filtering and flow processing) and completely processes all the security functions to the dedicated, inline security system. Unlike traditional security-enabled communications processors and dual-chip solutions (dedicated CPU and security coprocessor), the inline security architecture is not involved in processing packets that belong to an existing data flow (a connection using the same protocol, addressing and source). This allows the embedded CPU to dedicate its cycles to only control plane VPN functions such as flow setup, flow destruction and potential higher-level data plane processing tasks.

The result is superior data rates across packet sizes and a significant reduction of general-purpose processor utilization for security functions.

Data Plane Offloading
To overcome the bottleneck, inline security systems implement the complete data plane functionality into a dedicated, efficient system-on-a-chip hardware system -- the Inline Security Engine. The Inline Security Engine?s value lies in its capability to maximize data plane offloading from a host processor to dedicated inline security hardware.

As a key element of the Inline Security Engine, packet classification and flow processor modules ensure time-consuming packet-by-packet security processing is fully offloaded from the host processor along with any cryptographic processing implemented by the Inline Packet Engine module.

The microengines operate in parallel configurations, allowing complex security operations to be performed on the packet and administration data at the highest speeds, making the inline security system more efficient than any general-purpose processor-based, look-aside system. With the engine, the general-purpose processor is not involved in processing packets that belong to an existing data flow. This allows the processor to dedicate its cycles to data flow setups and other processing tasks. The result is a high-performance security solution that delivers Gigabit-rate processing.

For every packet, classifiers and flow processors perform a sanity check, deciding how the packet needs to be processed (either by the host processor or by the packet engine) or whether it needs to be discarded (filtering). Then the engines take care of the associated administration tasks, such as transforms and flow information updates. In the system, the packet classifiers and flow processors autonomously instruct the engine as to which operation needs to be performed on the packet.

The Inline Security Engine implements various data manipulation functions on incoming data as instructed by the packet classifier and flow processor, including data insertion, data removal, data replacement, data retrieval, and crypto, hash and checksum operations. In order to achieve Gigabit-rate throughputs, the engine uses a three-stage processing pipeline.

Inline security processing takes a step beyond traditional security architectures by deploying dedicated security hardware for full-data plane-packet classification, filtering and flow processing for every packet. The result is superior data rates across all packet sizes and a reduction of general-purpose processor use for VPN security functions. Its performance for small packets make the engine an ideal solution for securing real-time, high data rate Internet applications over IPsec VPNs.

This article originally appeared in the December 2006 issue of Security Products, pgs. 44-46.

Featured

  • 2025 Gun Violence Statistics Show Signs of Progress

    Omnilert, a national leader in AI-powered safety and emergency communications, has released its 2025 Gun Violence Statistics, along with a new interactive infographic examining national and school-related gun violence trends. In 2025, the U.S. recorded 38,762 gun-violence deaths, highlighting the continued importance of prevention, early detection, and coordinated response. Read Now

  • Big Brand Tire & Service Rolls Out Interface Virtual Perimeter Guard

    Interface Systems, a managed service provider delivering remote video monitoring, commercial security systems, business intelligence, and network services for multi-location enterprises, today announced that Big Brand Tire & Service, one of the nation’s fastest-growing independent tire and automotive service providers, has eliminated costly overnight break-ins and significantly reduced trespassing and vandalism at a high-risk location. The company achieved these results by deploying Interface Virtual Perimeter Guard, an AI-powered perimeter security solution designed to deter incidents before they occur. Read Now

  • The Evolution of ID Card Printing: Customer Challenges and Solutions

    The landscape of ID card printing is evolving to meet changing customer needs, transitioning from slow, manual processes to smart, on-demand printing solutions that address increasingly complex enrollment workflows. Read Now

  • TSA Awards Rohde & Schwarz Contract for Advanced Airport Screening Ahead of Soccer World Cup 2026

    Rohde & Schwarz, a provider of AI-based millimeter wave screening technology, announced today it has won a multi-million dollar award from TSA to supply its QPS201 AIT security scanners to passenger security screening checkpoints at selected Soccer World Cup 2026 host city airports. Read Now

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.