Font Size: a A A

The Research Of USB Key With Display Based On Z8D168

Posted on:2012-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:D SunFull Text:PDF
GTID:2178330332990780Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
With the rapid development of internet,online authentication has been widely used. USB Key as a network ID become the appropriate carrier of online authentication. USB Key is a integration of high degree of the integrated circuits, smart cards and cryptographic algorithms.Currently the secure risk of USB Key mainly due to the user's trading information is only shown on the PC side.If the PIN code of USB Key is stolen by trojans or phishing sites, the user's security will not be guaranteed. Based on the above considerations, we coule increase the display to the physical hardware of USB Key to show the key trading information,also we could increace the physical buttons to the physical hardware of USB Key to control the transaction. It will avoid the accidents and enhance the security of USB Key through the real information shown on the display and the physical buttons to cancel the transaction if the transaction data is illegally altered. Also the performance of the algorithms built-in USB Key is an important aspect to improve safety performance.Now most products of USB Key on the market are the first generation without display, few USB Key with display all use LCD(Liquid Crystal Display). This paper propose ePaper(electronic Paper) as the display module. The ePaper compared with the LCD mainly has the following advantages:(1) Paper as reflective display is more suitable for reading,the brightness of image will change according to the intensity of ambient light,the contrast will also change,therefore ePaper has more obvious advantages in strong light;(2) ultra-light,ultra-thin,ePaper has quite simple hardware structure,with thickness of about lmm;(3)low power consumption,ePaper has very low power consumption, display information even a short suspension of the power supply.Based on USB Key,the more well-known symmetrical cryptography algorithms are DES (Data Encryption Standard) and AES(Advanced Encryption Standard). As the actual length of the key is only 56bit, DES is now considered outdated, is used only in the applications of less secure demanding. In view of the end of fall of DES algorithm, Rijndael design of AES algorithm which satisfies:(1) against all known attacks;(2) speed on multiple platforms, compact code;(3) simple design. AES algorithm has been widely used now.The non-symmetrical cryptography algorithm(Public key algorithm) appeared in the 70s of the 20th century,the mainstream of public key cryptography algorithms are RSA(named with the names of three young scholars:Ron Rivest, Adi Shamir and Len Adleman)and ECC(Elliptic Curve Cryptosystems).RSA algorithm is the first relatively complete public key algorithm,it is not only used for data encryption and devryption but also used for signature and verification. RSA's security is based on the difficulty of the decomposition of large number. This paper proposes a method of fast computation modulo.The ECC's security is based on the calculation of the discrete logarithm on elliptic curve. This paper also optimizes the fast scalar multiplication. ECC compared with RSA has many technical advantages:higher security,less computation,faster processing speed,smaller storage space, lower bandwidth requirement.This paper based on domestic secure chip Z8D168 research the hardware design and software COS development of the USB Key with display, put forward the idea of ePaper as display. USB Key communicate with PC through the USB interface,and with ePaper through SPI interface,this paper research both USB protocol and the SPI protocol first. Base on the consideration of the importance of cryptographic algorithms to USB Key,this paper study the wide range use of symmetric algorithms DES and AES, public key cryptographic algorithm RSA and ECC. This paper proposes a method of fast computation modulo, also optimizes the fast scalar multiplication and achieves a variety of algorithms based on the USB Key.This paper has a important guiding significance for the hardware design and the software COS as well as the selection of various cryptography algorithms and implementation based on the USB Key of second generation.
Keywords/Search Tags:USB Key, USB, Symmetric cryptography, Public key cryptography, Z8D168U, Display
PDF Full Text Request
Related items