Font Size: a A A

Research On The Design And Implementation Of The Common Algorithm Of Information Security Based On SDSoC

Posted on:2017-07-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y MengFull Text:PDF
GTID:2348330512452056Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and internet technology, information security is being paid more and more attention. Being the basic and core position of the information security, the cryptography plays an important role in protecting applications of information security. Information data is encrypted by the encryption algorithm, so that even the encrypted data is captured by the Unauthorized users, they still cannot read the original information. Hash function and symmetric encryption algorithms are the most common used encryption algorithm, which has wide application in public key cryptography, digital signature, authentication and so on. How to implement the information security algorithms effectively and securely is discussed in this thesis.Based on the related technology of SDSoC design tool, we can develop a hardware system conveniently without knowing the detail of the hardware architecture. Though the hash function based on SDSoC is implemented by the high level programming language such as C language, the execution speed of it is much faster than the traditional software development. One advantage of using SDSoC is that the developer can pay their attention to algorithms rather than the hardware, so that the systems can work securely and reliably.This thesis use Zedboard as the hardware platform and Xlilinux as software platform. Based on that we design and implement the MD5, AES separately. At last the algorithms are transformed to FPGA hardware code not only improves the security of the system but also speeds up the algorithms. This paper aims to MD5, AES algorithms in the high handling capacity, real time and high speed, low resources occupation rate ways. From the experiment results of the MD5, AES separately, we can conclude that compare to the un-optimized algorithms, the optimized MD5, AES algorithms have a good performance in handling capacity and high speed, also they work with less resources occupation rate.
Keywords/Search Tags:hash function, symmetric encryption algorithms, SDSoC, HLS, FPGA, Zedboard
PDF Full Text Request
Related items