Font Size: a A A

Security Architecture Analysis And Algorithm Design In SoC

Posted on:2017-04-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y M HeFull Text:PDF
GTID:2348330482486845Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
Coming with the development of information technology,the demand for network communication and data storage is more and more,the security of data has become the focus of the public.The standalone software authority control and hardware encryption can't guarantee the security of the data path from the system level.First of all,the article gives the block diagram of TPM module and separately debated the processor?bus?random number generate?authority control?cryptographic algorithm.And also,the article analysises the security design of boot-up module and debug module.Second,the article completes the AES?RSA?SHA algorithm implementation based on verilog language,aimed at cipher coprocessor design.In the masked AES module design,the article discusses the flow and equivalent structure in encrypt algorithm and decrypt algorithm.the article puts more attention in the design of S-box based on finite field)2(8GF and the coefficient operation in mix column.As for the DPA attack,the article debates its theory basis and method to do a attack?the attack point and protect technique adopted in AES algorithm.Finally the article gives out the random masked AES algorithm implement in SoC design.According to the moduar arithmetic quality,the article discusses the RTL design of Montgomery modular multiplication algorithm based on 42 and FSM design to do a modular exponentiation algorithm.There are also some other key points to be discussed in RSA algorithm implement,such as the generated of big prime number and the parameters choose.At last,the article gives some details of the implement and some simulation diagrams in modelsim.The last part of the article gives the SHA-256 algorithm implement meeting the NIST standard.The entire design is consisted of preprocessing of plain text and iteration arithmetic.In details,the article discusses the FSM design in padding the message and variable tW part design.The article debates how to do a security module design in SoC according to the TPM design stardard and puts more effort in AES?RSA?SHA algorithm implement.
Keywords/Search Tags:Trusted system, TPM module, AES algorithm, DPA attack, RSA algorithm, SHA algorithm
PDF Full Text Request
Related items