Font Size: a A A

The Research Of Encrypted NIC On The Basis Of Permutation Code Algorithm

Posted on:2006-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y GengFull Text:PDF
GTID:2168360152991082Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the development of computer network, network safe problem especially interior network shows increasingly more important. That encryption software encrypts or decrypts information occupies the resource of CUP, and reduces the efficiency of systematic operation. Though hardware encryption card has raised encryption speed, it needs to use individual encryption installation. This has increased extra burden for the management of computer. The encryption network interface card in this paper has surmounted two above-mentioned problems. It simplifies the information process of handling and raises the performance of entire network. It plays the part of protection data communication of end to end.In this paper I have studied IPSec deeply and studied IKE in focus. IKE can produce the key automatically and solve the insecurity problem of transmitting keys. Then I studied the operation principle of NIC and 802.3 protocol of Ethernet, and analyzed the feasibility of embed IPSec protocol in the network card. I have studied some kinds of arithmetic, and brought forward the new arithmetic, that is Permutation Code Algothrim which has high encryption intensity and fast speed. I designed the scheme of encryption network interface card (ENIC) on these basises, which included the software and hardware. And I studied the design and embedding question of the encryption and decryption modules. At last the thesis puts forward some improvement to IPSec protocol.The ENIC can encrypt or decrypt information according to users' requests, and it can send or receive original information. ENIC can solve the problem of transmitting keys and doubly protect transmit information.
Keywords/Search Tags:network safe, nic, IPSec, permutation code algorithm, DES
PDF Full Text Request
Related items