Font Size: a A A

Tcm System Design Of The Cryptographic Algorithm Ip

Posted on:2012-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2218330335486414Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The existing measures which protect the security of information have a firewall, intrusion detection and virus protection usually, these tools used not only raise the complexity of the system, but also reduce the system efficiency greatly. Moreover, objects which are protected information security currently are focused on the server and network, ignoring the terminal equipment protection. But the terminal equipment is a main site to store data, most attacks begin from the terminal equipment. So in order to make the more information system security, we must change our mind, focusing on the terminal equipment. At this moment, trusted computing ideas have emerged.At present, both domestic and foreign trusted computing organizations are put forward a set of norms of trusted computing. This article follows "Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing" which been proposed by the domestic trusted computing organization, its research is an important part of a National Natural Science Foundation project named "a rearch of the I/O resources credible access strategies based on a multicore system'In order to making the TCM provides independent cryptographic algorithms, after compares the advantages and disadvantages of hardware and software realization methods, this article uses the SOPC technology to realize cryptographic algorithms in TCM system. This artical which uses EP2C20F484C8N core board provided by the Altera company designs and tests cryptographic algorithm IP core in TCM system, including SMS4 algorithm and SM3 algorithm, and a true random number generator IP. SMS4 IP is designed according to its own algorithm, under the control of the state machine realizing decrypted operation by the linear transformation and nonlinear transformation; SM3 IP is designed according to the SHA-256 algorithm based on the specification requirements, and make up by the interface module and reset module, the Wt produce modules and the computation module; True random number generator IP uses a ring oscillator as random source, goes through Von neumann corrector, then is processed by SHA-256 IP, and finally is exported. FPGA test results demonstrate that all cryptographic algorithms IP designed by this article reach its function. In the next stage, we will formulate TCM command and program TCM driver.
Keywords/Search Tags:Trusted computing, SOPC, Cryptographic algorithm IP, True random number generator IP
PDF Full Text Request
Related items