Font Size: a A A

Research And Design On Real-Time Digital Security Chip

Posted on:2007-04-01Degree:DoctorType:Dissertation
Country:ChinaCandidate:S C MaFull Text:PDF
GTID:1118360185954181Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Data Security includes storage security, network security and video/image security. In every security area, there exist many protocols, such as IPSec protocol in network security, and JPSEC in JPEG2000. The protocol is based on cryptographic algorithm, for example, IPSec and JPSEC all utilize encryption algorithm, authentication algorithm, and other algorithm to implement security of related content.Securiy algorithm is based on computational complex and one-way function, which is more compute-intensive and will be the bottle neck of the system if it can not be implemented efficiently. So it is necessary to implement them in VLSI or SOC.Real time security processor, however, faces many conflicting design challenges and constraints that are usually demanded at the same time. For example, several major objectives are:- Security,- Real time,- To fit into the requisite physical constraints (size, weight, and power)It was found that the most suitable signal processor which satisfies these requirements and constraints while providing enough flexibility with current IC technology would be FPGA (Field Programmable Gate Array)-based architecture.With these work, many interesting results are acquired, they include:- A complete and unified methodology for Storage Security;- A novel architecture which we call Cut-Through Architecture for storage security;- A novel architecture which we call Flow-Through Architecture for network security;- A novel selective encryption algorithm for JPEG2000, which encrypt 15% codestream and reach the security of JPEG2000 codestream- A FPGA prototype platform has been designed to implement the digital right protection in Digital Cinema.These results will contribute to establishment of the related security protocols, the architecture design and implementation. At the same time, the integrated design optimization of application, protocol, algorithm and architecture bring forth a new design methodology.
Keywords/Search Tags:Digital Security, Storage Security, Network Security, Security Protocol, SOC
PDF Full Text Request
Related items