Font Size: a A A

The Analysis And Design Of Implementation On Hardware Of AES Algorithm

Posted on:2005-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:M HuaFull Text:PDF
GTID:2168360125453347Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of information industry, more attention is paid to information security. Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core. In addition, now the implementation of cryptographic algorithm is on the transition from software to hardware and the crypto product is paid more and more regard. There for, it is very important to study and analyze the popular cryptographic algorithm and it's hardware implementation for the sake of nation's information security. By way of the new American data encryption standard, AES is actually be a international standard, furthermore, AES algorithm is free and opened, so that the AES crypto product especially the product implemented on hardware will gained more applications.First, the keystone and design principle of AES algorithm are presented, the structure of it is pictured carefully, the design skill aimed at it is analyzed, the advantages and disadvantages of it are summarized, the implementation methods are also presented and the speed data of encryption and decryption which implemented on software is provided. Then, the thesis give the analysis of AES ' s security and anti-attack capability, offer the pseudocode of four-round square attack, introduce a new attack: XSL attack.Secondly, the thesis discusses the hardware implementation of AES algorithm detailed. Several implemental structures such as basic structure, circular structure, interior structure and exterior structure are recommended. Also, the thinkable selection results are listed. According to the specialty of hardware implementation, two improvement of the algorithm are made. One is the pretreatment of decryption column transformation, thus, encryption and decryption can use the same column transformation circuit and save the circuit area as a result; The other is adopt the inverse expansion in decryption key expansion module of feedback working pattern. After these two improvement, the AES algorithm implemented on hardware will be easier.Symmetry grouping cryptology and non-symmetry public cryptology are the two main used crypto system today, they have their own superiority and inferior position. Integrated the two system's advantage, at the end of this thesis an encryption machine model base on mixed crypto system is brought forward which applied the hardware implementation of AES algorithm. And at last the feasibility of it is analyzed.
Keywords/Search Tags:AES, attack, Verilog, feedback working pattern, non-feedback working pattern
PDF Full Text Request
Related items