Font Size: a A A

Research And Implementation File Encryption Technology Based On ARM

Posted on:2016-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:J SunFull Text:PDF
GTID:2348330488473313Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Modern society, information technology has been widely used and development rapidly. Information security attract more and more people's attention. Information security includes secure storage of important data files, read and transfers secure safety. To ensure information security, in many areas related to information security, people are more and more frequent use of cipher machine, data encryption and other cryptographic devices USBKey cards and to guarantee the security of the data and file. But it could not guarantee the security of the data file fully through these cryptographic devices. First, as a general increase in computer technology, new technologies continue to emerge, the safe storage of client files increasingly threatened. Secondly, the attacker's technology continues to improve but also a challenge to password security, encryption requires the emergence of new technologies to reduce the probability of a file to be cracked. Finally, as the universal application of the network, the attacker to steal data through the network for file already very common, so to ensure document security in transmission is also crucial.Based on the method of research files in the encryption process and storage, analyzed the current information security needs, combined with low power consumption for embedded systems easy to prolonged use, the advantages of easy-to-carry, volume small and SD card as a file storage equipment has the storage capacity, microprocessor simple connection and lower the market price advantage, file encryption technology designed and implemented an ARM-based, focusing on the USBKey hardware encryption technology, authentication technology based on USBKey, the key technology of ARM to SD card in file storage and reading technology, TCP/IP protocol stack and integrity checking, and its implementation process. This paper introduces the technology applied to the file encryption research and implementation USBKey encryption technology based USBKey encryption technology through research, comparative analysis of the different encryption algorithm application, and implements user authentication, complete the user login module. Then, secure encrypted file storage designed for secure storage solution for user data files, a detailed study of the SD card data storage structure and reading the way proposed in the ARM peripherals stored in file encryption and decryption operations and encrypted files SD card implementation, based on the need to achieve USBKey file decryption operation when you need to read a file, the file memory by ARM analysis and research UART interface implements the ARM data file to SD card reader technology. Finally, to ensure the file is stored in the security and encryption technology, based on research networks in TCP/IP protocol stack, to solve data retransmission and multithreading issues, to ensure security during file transfer. The file encryption technology to achieve through authentication module, the integrity check module, file encryption and decryption module, file access control module and transmission module five modules together to achieve. The technology has its own unique file storage encryption mechanisms, and implement user authentication designed to achieve encryption and secure file transfer capabilities.The file encryption technology to achieve excellent encryption performance and excellent scalability. The technology give full play to the advantages of ARM embedded system on the storage and functions, and USBKey as hardware encryption device in the key storage security and against attacks is reliable.
Keywords/Search Tags:information security, authentication, embedded systems, file encryption, TCP/IP protocol stack
PDF Full Text Request
Related items