Font Size: a A A

Study And Implement On Hardware Encryption Of Information Security System

Posted on:2006-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:W Z ZhangFull Text:PDF
GTID:2168360155472254Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Cryptographic technology is an important way to ensure information security, and is the kernel of information safety. Among all kinds of cryptographic algorithms the block cipher is of some virtues—the fast speed of encryption and decryption, the easy standardization, convenient implement by software and hardware, and so on. So the block cipher is the core parts of the data encryption, digital signature, authentication and key management in the information security. Therefore it is widely used in the security area of the computer communication and in the security area of the information system. Rijndael is a respective one among block algorithms. This paper discusses the principle and encryption of the algorithm, and analyses its performance in detail. Then it debates the round change and discusses key expansion and storage and selection of round keys. Finally, the dencryption of Rijndael is given. Because the hardware implementation is faster than software and can ensure the security of system in physics, the projects of hardware implementation is presented, and analyses the capabilities for FPGA and PLD and DSP and SID. For the data of FPGA is in itself, it is hard to use the technique of NTFuse and it is difficult to break in physics, and so the FPGA is choosen as our hardware implementation way. Rijndael is realized by VHDL, and the better algorithm about byte substitution , row shift , column mix and the addition of round key. Based on the own characters of Rijndael,change and improve the round transform of algorithm.And then, use simple count,such as shift and XOR,to realize the algorithm.This method decreases the hardware area, optimizes the configuration of hardware, and increases the rate of hardware implementation largely. Aiming at the defect of Rijndael and the importance of key, the chaos is introduced to Rijndael, and the original key is generated to use chaos series, and then improves the security of the algorithm. Because of the good randomicity and the sensitivity to the beginning data, the chaos series is choosed to as the original key of Rijndael. And then enlarges the space of key. Responding to this, the principle, way and figure of hardware implementation about original key is given. The test proves that the security of system is largely improved after introducing the chaos series to Rijndael.
Keywords/Search Tags:Information Security, Encryption, Rijndael, Hardware Implementation, Key Generation
PDF Full Text Request
Related items