Font Size: a A A

Research On Big Data Encryption Algorithm Based On LZ4 Data Compression And Lattice Encryption

Posted on:2020-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:F Q MeiFull Text:PDF
GTID:2428330590472316Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the development of cloud computing and the Internet of Things(IOT),the data transmitted and stored has increased dramatically,and big data is the inevitable result.The application of big data is more and more important.However,there are many issues in transmission,storage and security.Due to the large amount of data,the transmission time is longer and the storage space is larger.Traditional encryption schemes are used for simple text encryption.If it is used for big data encryption,it is not only computationally complex but also takes a long time.More importantly,the traditional encryption scheme will not be safe when the quantum computer is available in near future.Data compression can effectively solve the problem of transmission and storage of big data,and lattice-cased cryptography could effectively resist quantum attacks and protect data security in future.This thesis chooses the LZ4 lossless data compression algorithm and the R-LWE public key encryption algorithm to solve the above problems.The compression speed of LZ4 lossless data compression algorithm is fastest.Through the research of the two algorithms,the algorithm or hardware implementation of the two algorithms are improved based on the hardware implementation,so that the hardware implementation can achieve better performance.At the same time,based on LZ4 lossless data compression algorithm and R-LWE public key encryption,an encryption algorithm for big data is proposed.Firstly,this thesis studies the defects of LZ4 lossless data compression algorithm in hardware implementation,and then proposes an improved algorithm.The improved algorithm not only consumes less resources after hardware implementation,but also its Compression and decompression throughput can achieve up to 1.92 Gb/s and 2.08 Gb/s.Its compression and decompression throughput are 20Secondly,the random number in the encryption algorithm is very important,it directly affects the security of the encryption system.Therefore,the pseudo random number generator cannot be used,but the output speed of the existing conventional true random number generator(TRNG)cannot meet the requirements of the high speed encryption system.This thesis proposes a new TRNG and the output rate is 160 Mbps.Compared with the conventional TRNG,it can not only generate true random number at a higher speed,but also take up the least hardware resource consumption.At the same time,the model analysis of the proposed TRNG is performed,and the validity of the proposed design is theoretically demonstrated.Thirdly,in order to have a hardware implementation with low speed and low resource consumption,a new polynomial multiplier hardware structure is proposed.After using the new polynomial multiplier,the hardware implementation of the R-LWE public key encryption algorithm has 1284 encrypted clocks and its throughput rate is 57.82 Mbps.The the hardware implementation is the fastest and the resource consumption is less in the same security level.Finally,in order to solve the problem of transmission,storage and security of big data,based on the previous work,a big data encryption algorithm integrating compression and encryption is designed and implemented.The big data compressed can be transferred faster,and the storage space is greatly reduced.The big data encrypted can be prevented from being obtained by unauthorized persons.Compared with the existing fast compression algorithm,the current hardware implementation scheme has less hardware resources,higher encryption speed and less redundancy.Therefore,the big data encryption algorithm based on LZ4 data compression and lattice encryption and its hardware implementation can be applied to the practical big data encryption.
Keywords/Search Tags:LZ4 lossless compression, R-LWE encryption, TRNG, Big data encryption
PDF Full Text Request
Related items