Font Size: a A A

Based On Fpga Gcm Encryption And Authentication Algorithm

Posted on:2011-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:S X QuFull Text:PDF
GTID:2208360308461903Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Following the development of information society, users have more and more requirement for the transmission of their data. It is hoped that users'network data can be transmitted to the destination host safely and integrity. It is the research hotspot that how to provide securate communication for the high speed network. For the applications of G/10G speed network or even more, such as GE,10GE, EPON, previous authenticated encryption technologies have been far away from the requirement. To solve this problem, this thesis has a depth study for the new authenticated encryption standard which is the GCM authenticated encryption algorithm. Besides, we design a high speed and low latency hardware implementation architecture for GCM. We simulate and analyse the designed GCM on the platform of Xilinx FPGA. In the meantime, according to the environment of GE Ethernet, we analyse the GE Ethernet frame format and design an authenticated encryption system which can authenticate and encrypt the GE Ethernet network data using GCM in order to insure the data can be transmitted in the GE Ethernet network safely and integrity. These works can lay a solid foundation for the following research and implementation work.This thesis's main work and relative summing-up are as following:1. Discuss and summary the existing authenticated encryption algorithms, point out the advantage of GCM, summary the research status of GCM algorithm.2. Introduce the principle of GCM algorithm and its key techniques, research the AES and Ghash on FPGA. For the research of AES, propose an equivalent AES pipelined implementation architecture which makes the critical path shorter than others with the throughput of 73.737Gbps. The proposed design research higher throughput than the other designs up to date; For the research of Ghash, its implementation of multiplier uses parallel architecture so that the throughput can reach 15.382Gbps. 3. Introduce the data flow of GCM and propose the hardware implementation architecture of GCM. Use Verilog HDL language to carry out GCM algorithm in accordance with the porposed architecture. Simulate and validate whether the implementation is right or not based on FPGA. The throughput of the design reaches 28.476Gbps and meets the requirement of 10G high speed network.4. Design an authenticated encryption system which can authenticate and encrypt the GE Ethernet network data using GCM according to the environment of GE Ethernet, and lay a solid foundation for the following research work that use GCM to other environment.Base on above work, we propose a high speed and low latency hardware implementation architecture for GCM in order to meet the authenticated encryption requirement of 10G or higher speed network. And design and implement an authenticated encryption system which can authenticate and encrypt the GE Ethernet network data using GCM.The full text is as follows:The 1st chapter discusses the research background, points out the advantage of GCM, summary the research status of GCM algorithm.The 2nd chapter introduces the algorithm principle of GCM and its key techniques which are AES encryption and Ghash authentication.The 3rd chapter researches the high speed implementation of AES on FPGA, proposes an equivalent pipelined architecture which makes the critical path shorter than others so that the throughput is the highest.The 4th chapter researches the high speed implementation of Ghash on FPGA, a parallel multiply architecture is used to implement Ghash multiplier which makes the throughput of Ghash higher than 10Gbps.The 5th chapter introduces the data flow of GCM, designes a high speed and low latency architecture for GCM, simulates and validates it on FPGA, and dicusses the application environment of GCM.The 6th chapter introduces FPGA and GE Ethernet, designes and implements an authenticated encryption system which can authenticate and encrypt the GE Ethernet network data using GCM.The 7th chapter summary research results of this paper.
Keywords/Search Tags:GCM, AES, Ghash, network security, authenticated encryption, high speed network
PDF Full Text Request
Related items