Font Size: a A A

Scalable Password Chip Dynamic Protection And Algorithm Design And Implementation,

Posted on:2006-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:H B DongFull Text:PDF
GTID:2208360152998560Subject:Information and Signal Processing
Abstract/Summary:PDF Full Text Request
With the development of information technology, the security research of it has become a very important problem. The general method to settle this problem is to encrypt the data. When we encrypt data in hardware, the most usage is cryptographic chip now. Aiming at the shortcomings of immobility structure and single algorithm of the traditional cryptographic chip, this paper presents a new method to design cipher chip. In this design, the user can modify the algorithm and other parameters in the chip. On the other side, in view of the security intimidation with the agility, two protective schemes were presented, dynamic protection and static protection. The two methods can provide more protection when the chip being usage. In this design, the dynamic protection and the algorithms in the chip were designed by me, the works are the follows: Encryption algorithm: Encryption algorithm is a very important part in cryptographic chip, its main task is to encrypt/decrypt the data. In this design, Rijndael algorithm was selected as the inner algorithm, this algorithm has authorized as AES algorithm by NIST and has expansive applied foreground. When designing the algorithm, all parts of it were optimized to my best. Moreover, a very simple interface was constituted and makes it as the interface rule. If another algorithm be designed in the future, the interface can offer a working foundation. Dynamic protection: The main function of dynamic protection is to deal with the sensitive request inputted by the user when the chip is working. For this, I design dynamic protection module. If the user wants to encrypt/decrypt, the module transfer the signals to the algorithm module directly. When the user wants to change the keys of algorithm or upgrade algorithm, they must first process a necessary authentication. If they pass, then the chip changes by the user's request, otherwise an error signal was sent out .In the module, all requests was constituted as child module, so it is easy to expand it in the future. With the cooperation of the two modules, the chip can satisfy the user's various...
Keywords/Search Tags:cryptographic chip, AES, encrypt/decrypt, dynamic protection
PDF Full Text Request
Related items