Font Size: a A A

Hardware Design Of Encrypted U Disk Based On Permutation Code

Posted on:2008-08-19Degree:MasterType:Thesis
Country:ChinaCandidate:L YuFull Text:PDF
GTID:2178360245978520Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With social information degree unceasing increasing, the people are more and more high to the information storage request. The memory carrier security is key for the information system security. In present many memories carriers, U plate because its soon many merits to obtain the widespread application.Because common U disk store and transmit data in plaintext form, unavoidable potential safety menace has brought. Based on the insufficiency of safety of existent U disk, an method of data encrypt and hardware encrypt for secret U disk is presented, which can well protect safety, integrity and credibility of data in U disk. The data encryption technology causes the data to be saved in cipher text form in the U disk. In addition to having all functions of the common U disk, it adopts permutation code algorithm, hardware encryption completely, which simply and quickly.Encryption technology and hardware designing are introduced. Introduce the mostly used modern encryption methods and technologies. We analyze the advantage and disadvantage of symmetric algorithm and asymmetric algorithm, and introduce permutation code. Permutation code broke through the traditional concept of block algorithm, and improved the encrypt intensity greatly. USB mass storage transport protocol; the hardware structure designing of permutation code encryption u disk, including USB interface control, voltage transformation, data encryption/ data decryption, data read/ data write and firmware are introduced emphatically.
Keywords/Search Tags:permutation code, data encrypt, hardware encrypt, usb interface, firmware
PDF Full Text Request
Related items