Font Size: a A A

HMACSHA196 Algorithm Hardware Realization

Posted on:2007-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y B MaFull Text:PDF
GTID:2178360185473460Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
Along with the modern communication development and the rapid popularization, specially along with unify the computer internet by the correspondence and the computer which but is born comprehensively to enter everyone, causes the information sharing application day by day widespread and is thorough. The world scope information revolution stimulated in the human history the most active productive forces, but at the same time the information security problem prominent moreover the situation also more and more is day by day complex. The fact proved that, the use password technology encrypts the information is the most economical feasible means. It does not guarantee the correspondence in one kind of latent safe and secure environment the security.In recent years on electronic commerce, the electronic government affairs and the net business model the and so on bank swift and violent development, have brought for people's life quickly and are convenient. But, the people like bank account number, the credit card account number, the company contract, the commercial order form and so on, in do not have the security measure in the network, has the possibility to intercept extremely, or the duplication, or the revision, or deletes, creates divulges a secret or the information loss. But these information have the strict security demand regarding receive outside third party. In order to cease this kind of matter the occurrence, this article studies the HMACSHA196 crypto-algorithm has the strong practical significance and the feasibility in the protection information complete aspect. Based on the above situation, this article through to the algorithm and the scene programmable chip characteristic analysis, the optimization designed and has realized the hardware system HMACSHA196 crypto-algorithm application plan, might fundamentally prevent the information illegal is tampered with, has provided the important safeguard for the maintenance network information security. Significance and feasibility.
Keywords/Search Tags:SHA1 Algorithm, HMACSHA196 Algorithm, Completeness check, Encryption, Field Programmable Gate Array, Universal Asynchronous Receiver Transmmitter
PDF Full Text Request
Related items