Font Size: a A A

Its Dsp Implementation Of The Rijndael Encryption Algorithm

Posted on:2007-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:Q S DuFull Text:PDF
GTID:2208360182993186Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The technology of computer and internet develops fast, which makes modern society highly informationalized. Nowadays, digital information grows extremely in our daily life, and the importance of security increases correspondingly. People always protect information transferred in the untrusted channel from leakage by cryptographic algorithms.It has more than twenty years since DES was adopted in 1977.DES isn't useful in some fields because of new attacks. Therefore, rijndael algorithm was selected by NIST of the United States as the Advanced Encryption Standard (AES).It will become the most widespread block cipher standard. It is very important to study and analyze the popular cryptographic algorithm. In Chapter 2,it describes mathematical basis, principle, architecture and the flow of cryption.For the security of rijndael algorithm, in Chapter 3 it deals with its whole structure. Its structure is a kind of net structure. Its first and final round was all changed. It analyzes the design principle of the S layer, the P layer and the key addition, which is of importance to design the block cipher.In Chapter 4, at first it describes the analysis of block cipher. It includes the kinds of attacks, the two aspects of attacks complexity and some attack methods. Then, the resistance against all known attacks is discussed. These methods are Differential cryptanalysis, Linear cryptanalysis, Square attack and interpolation attack. Finally, the cipher and its inverse use different components practically eliminate the possibility for the weak keys and semi-weak keys as exiting for DES.Rijndael algorithm which has the great feature is easy to implement. In Chapter 5, how to implement in DSP environment is discussed. There it describes the technology of DSP and the flow of DSP program. At last, the method to optimize rijndael algorithm when implemented is given.For the use, in Chapter 6, the model on the base of rijndael algorithm and RSA is given. Then, it describes how to design the software of a ciphercard inDSP environment.
Keywords/Search Tags:the encryption algorithm Rijndael, Advanced encryption standard(AES), Cryptanalysis, DSP, TMS320VC5416, Rijndael Key Schedule
PDF Full Text Request
Related items