Network Layer Privacy Protection Using Format-Preserving Encryption

被引:1
作者
Micovic, Marko [1 ]
Radenkovic, Uros [1 ]
Vuletic, Pavle [1 ]
机构
[1] Univ Belgrade, Sch Elect Engn, Bulevar Kralja Aleksandra 73, Belgrade 11000, Serbia
关键词
network privacy; format-preserving encryption; programmable networks;
D O I
10.3390/electronics12234800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Format-Preserving Encryption (FPE) algorithms are symmetric cryptographic algorithms that encrypt an arbitrary-length plaintext into a ciphertext of the same size. Standardisation bodies recognised the first FPE algorithms (FEA-1, FEA-2, FF1 and FF3-1) in the last decade, and they have not been used for network layer privacy protection so far. However, their ability to encrypt arbitrary-length plaintext makes them suitable for encrypting selected packet header fields and replacing their original value with ciphertext of the same size without storing excessive information on the network element. If the encrypted fields carry personally identifiable information, it is possible to protect the privacy of the endpoints in the communication. This paper presents our research on using FPE for network layer privacy protection and describes LISPP, a lightweight, stateless network layer privacy protection system. The system was developed for programmable smart network interface cards (NIC) and thoroughly tested in a real network environment. We have created several implementations ranging from pure P4 to a mix of P4 and C implementations, exploring their performance and the suitability of target-independent P4 language for such processor-intensive applications. Finally, LISPP achieved line rate TCP throughput, up to 4.5 million packets per second, with the penalty of only 30 to 60 microseconds of additional one-way delay, proving that it is adequate for use in production networks. The most efficient implementation was with the FF3-1 algorithm developed in C and carefully adapted to the specific hardware configuration of the NIC.
引用
收藏
页数:21
相关论文
共 51 条
  • [1] A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment
    AlSabeh, Ali
    Khoury, Joseph
    Kfoury, Elie
    Crichigno, Jorge
    Bou-Harb, Elias
    [J]. COMPUTER NETWORKS, 2022, 207
  • [2] Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
    Amon, Ohad
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 127 - 154
  • [3] [Anonymous], Programming Netronome Agilio SmartNICs
  • [4] [Anonymous], Mellanox Network Benchmarking Utility
  • [5] [Anonymous], NFP-4000 Theory of Operation
  • [6] [Anonymous], AS6447-IPv6 BGP Table Statistics
  • [7] [Anonymous], GDPR.Eu What Is Considered Personal Data under the EU GDPR?
  • [8] [Anonymous], 2021, Non-Paper on the Way Forward on Data Retention
  • [9] [Anonymous], P416 Portable Switch Architecture (PSA) Version 1.2. The P4.Org Architecture Working Group 2022-12-22
  • [10] [Anonymous], The Joy of Micro-C