Font Size: a A A

Research And Implementation Of RSA Cryptography Algorithm

Posted on:2006-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:L Y ZhangFull Text:PDF
GTID:2168360155459992Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Internet was based on the open protocol like HTTP, TCP/IP, MIME, FTP etc.. Due to the simple protocol structure, Internet becomes more and more popular nowadays. It has penetrated into the main fields of people' s common life and national security system. But they are still not good for Internet system' s security and protection. There are many network attacks when we communicate through network, and the attacks will damage the information system seriously, so network security technology has become an important research topic for many governments and organizations. The appearance of public-key cryptography algorithm is to resolve some Internet security problems.Among the various public key cryptosystem, RSA algorithm is the best choice in both theory and application, and it is often used in digital signature and identification system. Designing low complexity and high speed RSA digital circuit becomes more attractive with the use of modem icroelectronic chip design technology. This thesis is based on the Jiangsu province project of "kilomega encrypted network card" . Research and implementation of RSA Cryptography algorithm has been proposed.In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced. It is the base of knowing the RSA cryptosystem well. RSA system principle and some algorithm used in the encrypt and decrypt process are analyzed, especially radix-2 modified Montgomery modular multiplication algorithm. The full system's design and partition is achieved. The modules of prepared implementation, exponentiation computation system and system controller etc. have been detailed based on system partition.The Top-Down design method and Bottom-Up test method are employed. The circuit is described in VerilogHDL on RTL level. The simulation and synthesis with EDA tools are completed, and the factual circuit and net lists are acquired.
Keywords/Search Tags:public-key cryptography algorithm, kilomega encrypted network card, RSA cryptosystem, Montgomery modular multiplication algorithm
PDF Full Text Request
Related items