Font Size: a A A

An Optimization In Hybrid Encryption SOC Embedded Communication Circuit Design

Posted on:2016-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z WangFull Text:PDF
GTID:2308330470464581Subject:IC Engineering
Abstract/Summary:PDF Full Text Request
Recently, the problem of communication security can not be neglected, with the widely use of IOT,Smart home, and cloud processing. Whether the e-commerce,the Internet, or remote industrial control are starting to support more and more intelligent mobile device. Due to the incident of Snowden in 2013, every country has to develop its encryption technology. In the era of 2G and 3G, China only can adopt the encryption standard from European and American. In the coming era of 4G,in order to protect national security, our country starts to develop its own algorithms. In those algorithms,ZUC algorithm through the examine and verify of 3GPP.Data encryption intensity and data integrity are two major concerns of information security technology. How to design a low bandwidth, low cost, high security intensity and speed system is an important subject in engineering field.Data encryption is a commonly used method in modern business.The encryption algorithm can be divided into two categories, symmetry and asymmetry. Both algorithms have advantages and disadvantages. The former has a high information processing speed,but it will lead to larger amount of keys in the network. The second will take up a high bandwidth, but the number of keys is small.When encryption system is embedded in the actual application, there will bring a problem of higher cost and lower encryption intensity.Aiming at this problem, the design of the embedded encryption system has made the following research:1 on the basis of the existing encryption algorithm,selecting the international mainstream algorithm and our self-developed encryption algorithm to design a mixed encryption system.This design can make up the defects between two kinds of algorithm.2 By applying ASIC to achieve the core parts of algorithm.Then make a pipeline design to the circuit structure.3 The accurate synchronization design between hardware and software.4 Using NC-sim to verify the functions of system.5 Using the result of DC tools to analysis the system.
Keywords/Search Tags:Embedded, Hardware and Software, Encryption Algorithm, ASIC
PDF Full Text Request
Related items