Font Size: a A A

Research And Design Of Flash Encryption Storage

Posted on:2007-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WuFull Text:PDF
GTID:2178360212472019Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
At present, the embedded computer system has been playing a more and more important role in every field of humankinds' production activities. The realization of its function largely depends on programme code solidified in memory and related data. As a special product of mankind commodity society, programme code is difficult-produced and easy-duplicated; high-cost in production and low expense in replication. As a result, it leads to illegal replication on a world scale, which seriously infringes on the intellectual property right of copyright owners. In addition to law means, to safeguard the intellectual stolen phenomena, it is quite necessary to carry out encrypting processes for the programme code and operating data. In this thesis, the author put forward an encryption technology, which can effectively prevent against various kinds of malicious steals towards the software of embedded computer. The encryption system consists of two parts: one is encryption software operating on PC; the other is encryption chip. Both of them can be encrypted and decrypted the programme by the similar cipher. Firstly, encrypt the programme of embedded computer with encryption software, and then solidify on Flash chip in operation. When embedded computer reads the command and data, which could be decrypted by encryption software to revivify the right programme code and resent to the CPU of embedded computer. When embedded computer needs to input data to Flash memory, the data could be encrypted by encryption chip and then resent to Flash memory. The goal of separating encryption technology from cipher could be reached by such design. Attaining "one cipher for one computer" when using the embedded computer, in this way, the developer could authorize the cipher a license and distribute it to the legal users, which would lay a good technological foundation for future Intellectual Property right.
Keywords/Search Tags:Flash, Embedded system, ENIGMA, RC5, RC6, DES, S-Box, Verilog HDL
PDF Full Text Request
Related items