Font Size: a A A

LUKS Authentication Circuit And Password Recovery Based On FPGA

Posted on:2018-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:C H CaoFull Text:PDF
GTID:2428330512494315Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Under the development of information technology,the electronic data is exploding,the security of the data has taken more attention.LUKS is disk encryption specific created by Clemens Fruhwirth in 2004.GPU and FPGA,such high-performance computing platform promote the development of the password recovery technology.LUKS password recovery method designed in this paper is aimed at symmetric cipher algorithm AES-128 and the hash algorithm of SHA-1.This paper first introduced the theory of algorithm involving the password recovery method and the concept of LUKS disk encryption.Then this article in view of the principle of AES-128 and SHA-1 proposed LUKS password recovery method.At the end,this paper implemented two different LUKS password recovery designs on FPGA platform and then compared the designs on FPGA with designs on CPU and GPU on the password recovery speed and power consumption.The comparison verified the low consumption characteristic of the FPGA and the advantage of pipeline structureIn this paper,the main work:(1)This paper implemented the secondary loop unrolling,pre-computing structure of SHA-1 algorithm.With implementation of four stages pipeline architecture of SHA-1,this paper proposed and implemented eight stages pipeline architecture of PBKDF2.(2)Considering resource usage and throughput,this paper optimized the design of AES-128-ECB and implemented a high-performance,high-throughput AES-128-ECB hardware architecture based on T-box.Then this paper implemented AES-128-CBC decryption algorithm and AES-256-XTS decryption algorithm.(3)After the implementation of the hardware design of each module algorithm,this paper proposed and implemented two different LUKS authentication chip hardware design on FPGA Picozed 7030 platform,which are respectively the pipeline structure and iterative structure.With the hardware system design,this paper completed the construction of the upper testing software environment.
Keywords/Search Tags:LUKS, Password Recovery, Cipher Algorithm
PDF Full Text Request
Related items