Method for Cryptographic Engine to Interface with an Arbitrary Number of Processor Cards in a Scalable Environment

Information

  • Patent Application
  • 20220069998
  • Publication Number
    20220069998
  • Date Filed
    September 01, 2020
    3 years ago
  • Date Published
    March 03, 2022
    2 years ago
Abstract
A data radio has an arbitrary number of processors configured to interact with a single cryptographic engine or security module. Hardware strapping allows each card and processor to identify its location in a system. The static region of the field-programmable gate array contains the functionality to manage access to the backplane. Dynamic regions of the field-programmable gate array fabric are used to route the data correctly to and from the security module within a specific application. Software is deployed on any card with a generic load that is agnostic to its location and the hardware self-configures.
Description
BACKGROUND

In a network architecture with one or more security modules services a plurality of general-purpose modules, each security module may need to securely communicate with each of the general-purpose modules. Where the network architecture does not have a fixed topology, security modules and general-purpose modules may not have defined physical or logical addresses. In those situations, the network system cannot establish secure channels between security modules and general-purpose modules.


State of the art cryptographic architecture is designed with fixed hardware paths and known quantities of waveforms and processors that interface with a cryptographic security module. Data from multiple originating sources will arrive at the same physical address and thus presents a problem for the cryptographic engine. Data entering the cryptographic engine needs to be routed to the correct cryptographic algorithm and needs to be returned to the proper network address without being exposed to other locations in the network.


SUMMARY

In one aspect, embodiments of the inventive concepts disclosed herein are directed to a system having an arbitrary number of processors configured to interact with a single cryptographic engine or security module. Hardware strapping allows each card and processor to identify its location in a system. The static region of the field-programmable gate array contains the functionality to manage access to the backplane. Dynamic regions of the field-programmable gate array fabric are used to route the data correctly to and from the security module within a specific application. Software is deployed on any card with a generic load that is agnostic to its location and the hardware self-configures.


It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and should not restrict the scope of the claims. The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate exemplary embodiments of the inventive concepts disclosed herein and together with the general description, serve to explain the principles.





BRIEF DESCRIPTION OF THE DRAWINGS

The numerous advantages of the embodiments of the inventive concepts disclosed herein may be better understood by those skilled in the art by reference to the accompanying figures in which:



FIG. 1 shows a block diagram of a network of nodes;



FIG. 2 shows a block diagram of a network of nodes;



FIG. 3 shows a block diagram of a system for implementing data connections between components in a network according to an exemplary embodiment;



FIG. 4A shows a block diagram of a security module according to an exemplary embodiment;



FIG. 4B shows a block diagram a security module according to an exemplary embodiment;





DETAILED DESCRIPTION

Before explaining at least one embodiment of the inventive concepts disclosed herein in detail, it is to be understood that the inventive concepts are not limited in their application to the details of construction and the arrangement of the components or steps or methodologies set forth in the following description or illustrated in the drawings. In the following detailed description of embodiments of the instant inventive concepts, numerous specific details are set forth in order to provide a more thorough understanding of the inventive concepts. However, it will be apparent to one of ordinary skill in the art having the benefit of the instant disclosure that the inventive concepts disclosed herein may be practiced without these specific details. In other instances, well-known features may not be described in detail to avoid unnecessarily complicating the instant disclosure. The inventive concepts disclosed herein are capable of other embodiments or of being practiced or carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein is for the purpose of description and should not be regarded as limiting.


As used herein a letter following a reference numeral is intended to reference an embodiment of the feature or element that may be similar, but not necessarily identical, to a previously described element or feature bearing the same reference numeral (e.g., 1, 1a, 1b). Such shorthand notations are used for purposes of convenience only, and should not be construed to limit the inventive concepts disclosed herein in any way unless expressly stated to the contrary.


Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by anyone of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).


In addition, use of the “a” or “an” are employed to describe elements and components of embodiments of the instant inventive concepts. This is done merely for convenience and to give a general sense of the inventive concepts, and “a” and “an” are intended to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.


Finally, as used herein any reference to “one embodiment,” or “some embodiments” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the inventive concepts disclosed herein. The appearances of the phrase “in some embodiments” in various places in the specification are not necessarily all referring to the same embodiment, and embodiments of the inventive concepts disclosed may include one or more of the features expressly described or inherently present herein, or any combination of sub-combination of two or more such features, along with any other features which may not necessarily be expressly described or inherently present in the instant disclosure.


Broadly, embodiments of the inventive concepts disclosed herein are directed to a system having an arbitrary number of processors configured to interact with a single cryptographic engine or security module. Hardware strapping allows each card and processor to identify its location in a system. The static region of the field-programmable gate array contains the functionality to manage access to the backplane. Dynamic regions of the field-programmable gate array fabric are used to route the data correctly to and from the security module within a specific application. Software is deployed on any card with a generic load that is agnostic to its location and the hardware self-configures.


Referring to FIG. 1, a block diagram of a network of nodes is shown. In a system where an arbitrary number of nodes are connected via a common network 100, the system comprises security processing modules 102, 104, 106 embodied in one or more nodes and general-purpose modules 108, 110, 112, 114, 116, 118, 120 embodied in one or more nodes. Each of the security processing modules 102, 104, 106 must be able to receive a communication from any of the general-purpose modules 108, 110, 112, 114, 116, 118, 120, perform the appropriate security operation on the data in the communication, and return it securely to the originator of the secure communication over any possible communication path to the other modules 102, 104, 106, 108, 110, 112, 114, 116, 118, 120 (or corresponding node). Compounding the issue for this secure communication, each of the modules 102, 104, 106, 108, 110, 112, 114, 116, 118, 120 (or corresponding nodes) can be placed in any physical or logical position with respect to the common network 100. In at least one embodiment, data communication elements embodied in the one or more nodes include a mechanism to determine the physical and/logical location of modules 102, 104, 106, 108, 110, 112, 114, 116, 118, 120 in the common network 100, discover the network path to one of the security processing modules 102, 104, 106, and have the security processing modules 102, 104, 106 securely receive and transmit data to any of the general-purpose modules 108, 110, 112, 114, 116, 118, 120.


Referring to FIG. 2, a block diagram of a network 200 of nodes is shown. The network 200 includes a plurality of modules 202, 204, 206, 208, 210, 212 (embodied in one or more network nodes). In at least one embodiment, the network 200 includes a single security processing module 202 and a plurality of general-purpose modules 204, 206, 208, 210, 212. A path between the security processing module 202 and a second general-purpose module 206 represents a desired secure path 214. Neither the second general-purpose module 206 nor the security processing module 202 knows its own physical or logical location in the network or the physical or logical location of the other at startup. The security processing module 202 and the second general-purpose module 206 must determine which network path to the other module is the correct common path that may be established as a desired secure path 214.


Referring to FIG. 3, a block diagram of a system for implementing data connections between components in a network according to an exemplary embodiment is shown. A radio according to at least one exemplary embodiment is composed of a scalable number of circuit card assemblies 300 with one or more processors 302 and field programmable gate arrays 308 on them that can host various programmability packages, including both software and firmware. Each processor 302 may define one or more interface ports 304 including cryptographic interface ports 306.


These circuit card assemblies 300 may host waveforms or other capabilities, perform the function of a security module, provide an interface between the radio and a host platform or user, etc. The field programmable gate array 308 hosts a cryptographic engine. The cryptographic engine provides data management (including keys, certificates, and algorithms), authentication, confidentiality, and integrity. It may be appreciated that any of these functions may be hosted on any other circuit card assembly 300 in the radio in addition to being hosted in the security module. Different layers of security, enabled by the available functions, may be applied based on different kinds of applications (e.g. boot, communications, storage, etc.) The field programmable gate array 308 defines a static region 334, hardware strapped to a unique identification sequence, the static region 334 comprising a plurality of peripheral transport layer interfaces 318, 320, 322, 324, 326, 328, 330, 332. Each peripheral transport layer interface 318, 320, 322, 324, 326, 328, 330, 332 is in data communication with the processor 302 (specifically the interface ports 304 and cryptographic interface ports 306) via a dynamic region 314 defined by the field programmable gate array 308, the dynamic region 314 defining a plurality of direct memory access ports 310, 312 and switch banks 316. Hardware strapping allows traffic to and from that circuit card assembly 300 to be easily identifiable and the location of the circuit card assembly 300 to be easily identifiable. The cryptographic engine may simultaneously identify and dynamically establish communication channels based on discovering locations of modules in the network.


At startup, the field programmable gate array 308 instantiates a connection between each peripheral transport layer interface 318, 320, 322, 324, 326, 328, 330, 332 and an appropriate switch bank 316. Each switch bank 316 in the dynamic region 314 of the field programmable gate array 308 is configured based on configuration hardware strapping from a static register read at startup; each static register being unique to each slot a circuit card assembly 300 may be plugged into. Each switch bank 316 is configured to provide interfaces to a security module 312 direct memory access port, and to a gateway of the radio to the host interface such that security processing and control from a user are enabled regardless of the slot in which the circuit card assembly 300 is located. Such embodiment allows software to address other processors that are connected as Ethernet connections regardless of the location of the processor 302 and circuit card assembly 300 in the radio. Whenever the cryptographic engine is used it establishes a communication channel and excludes any traffic that doesn't correspond to those hardware strapped static register addresses.


In at least one embodiment, a common security module performs cryptographic functions for waveforms transiting the circuit card assembly 300, as well as crypto variable handling. The architecture that enables the common security module is independent of the location of the hardware and nature of the waveforms hosted in the radio relative to the location of the security module. Hardware may be scaled in complexity and number of cards while still maintaining secure connection to the common security module. The common security module provides cryptographic functionality for all capabilities inside the radio.


In at least one embodiment, the circuit card assembly 300 may be configured for mesh network communications, where each circuit card assembly 300 determines its location in the mesh network so that the correct peripherals are configured to enable point-to-point communication for each component in the radio. Full interfaces between all processors are not required, or indeed for security reasons, are not allowed.


Referring to FIGS. 4A and 4B, block diagrams of security module interface according to an exemplary embodiment are shown. When a cryptographic channel is opened, the security module must be configured to only allow traffic through to the allowed set of interfaces (i.e., the black and red cryptographic interfaces and no others). When the security module starts (such as in FIG. 4A), cryptographic channels 418, 420 are unloaded but data routers 414, 416 and control routers 412 are partially enabled. The security module connects to a main terminal interface to allow keying and configuration commands as well as establishing interfaces to processing elements.


When a processing element is ready to create a cryptographic channel 418, 420, it sends a command to the security module to load and configure a cryptographic channel 418, 420. When the security module receives a command from a specific red interface 422, it loads the channel functionality, and also configures the data routers 414, 416 to only allow access to the cryptographic channel 418, 420 through the interface it was configured from (for example the red interface 422), plus its matching black interface, which is loaded from a configuration map stored in the security module. The configured security module (such as in FIG. 4B) may allow data traffic between the two corresponding interfaces via the configured cryptographic channel 418, but exclude any other access to the configured cryptographic channel 418. Any other traffic from any other interface cannot be sent through the configured cryptographic channel 418 regardless of direction. In at least one embodiment, no traffic may utilize any cryptographic channel 418, 420 until configuration is complete.


Between the configuration of the individual cards at startup and the auto configuring of the security module during cryptographic channel substantiation, an arbitrary number of processor cards and waveforms may interface securely with a single common security module. Hardware strapping and self-configuring of field programmable gate arrays in a data radio provides a novel method to enable scalability and reusability of the hardware inside the data radio.


It is believed that the inventive concepts disclosed herein and many of their attendant advantages will be understood by the foregoing description of embodiments of the inventive concepts disclosed, and it will be apparent that various changes may be made in the form, construction, and arrangement of the components thereof without departing from the broad scope of the inventive concepts disclosed herein or without sacrificing all of their material advantages; and individual features from various embodiments may be combined to arrive at other embodiments. The form herein before described being merely an explanatory embodiment thereof, it is the intention of the following claims to encompass and include such changes. Furthermore, any of the features disclosed in relation to any of the individual embodiments may be incorporated into any other embodiment.

Claims
  • 1. A circuit card assembly comprising: at least one processor defining a plurality of interface ports and a plurality of cryptographic ports; andat least one field programmable gate array configured to host a plurality of cryptographic functions, the at least one field programmable gate array defining: a static region defining a plurality of transport layer interfaces; anda dynamic region comprising at least one switch bank configured to connect one or more of the transport layer interfaces to one or more of the plurality of interface ports and plurality of cryptographic ports,wherein:the at least one processor is configured to: establish a communication channel between a first transport layer interface and a second transport layer interface via the at least one switch bank; andapply one or more of the plurality of cryptographic functions to the communication channel.
  • 2. The circuit card assembly of claim 1, wherein the at least one processor is further configured to exclude all traffic from the communication channel that does originate from one of the first transport layer interface or second transport layer interface, and is directed to one of the first transport layer interface or second transport layer interface.
  • 3. The circuit card assembly of claim 1, wherein applying the one or more of the plurality of cryptographic functions is based on application specifications of an application requesting the communication channel.
  • 4. The circuit card assembly of claim 1, wherein the static region is configured to be hardware strapped to a unique identification sequence corresponding to a slot where the circuit card assembly is installed.
  • 5. The circuit card assembly of claim 4, wherein the at least one processor is further configured to identify the unique identification sequence from the slot where the circuit card assembly is installed during a startup sequence.
  • 6. The circuit card assembly of claim 5, wherein the at least one processor is further configured to receive remote unique identification sequences, each corresponding to a node connected to one of the plurality of transport layer interfaces during the startup sequence.
  • 7. The circuit card assembly of claim 1, wherein: the communication channel comprises a first secure communication channel;the at least one processor is further configured to: establish a second secure communication channel between the first transport layer interface and a third transport layer interface via the at least one switch bank; andapply one or more of the plurality of cryptographic functions to the second secure communication channel; andthe first secure communication channel and second communication channel are logically isolated and utilize a common cryptographic engine.
  • 8. A method comprising: receiving a request from a requesting node to establish a secure communication channel between the requesting node and a target node;establishing a communication channel between a first transport layer interface and a second transport layer interface, each defined by a static region of a field programmable gate array, via at least one switch bank in a dynamic region of the field programmable gate array; andapplying one or more cryptographic functions to the communication channel. establish a communication channel between a first transport layer interface and a second transport layer interface via the at least one switch bank; andapply one or more of the plurality of cryptographic functions to the communication channel.
  • 9. The method of claim 8, further comprising excluding all traffic from the communication channel that does originate from one of the first transport layer interface or second transport layer interface, and is directed to one of the first transport layer interface or second transport layer interface.
  • 10. The method of claim 8, wherein applying the one or more of the plurality of cryptographic functions is based on application specifications of an application requesting the communication channel.
  • 11. The method of claim 8, further comprising identifying a unique location of the static region based on a hardware strapped unique identification sequence.
  • 12. The method of claim 11, further comprising identifying the unique identification sequence during a startup sequence.
  • 13. The method of claim 12, further comprising receiving remote unique identification sequences, each corresponding to a node connected a transport layer interface during the startup sequence.
  • 14. The method of claim 8, wherein: the communication channel comprises a first secure communication channel;the method further comprises: establishing a second secure communication channel between the first transport layer interface and a third transport layer interface via the at least one switch bank; andapplying one or more of the plurality of cryptographic functions to the second secure communication channel; andthe first secure communication channel and second communication channel are logically isolated and utilize a common cryptographic engine.