Font Size: a A A

Design And Implementation Of Authentication And Encryption System Based On National Encryption Chip

Posted on:2020-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:L X WangFull Text:PDF
GTID:2428330596995388Subject:Control engineering
Abstract/Summary:PDF Full Text Request
For the past few years,with the popularization of communication technology,the transmission of data information can be seen everywhere,which has resulted in the security problems to be more and more prominent.Identity authentication technology and information encryption technology are the key to protecting the information security of both parties in the field of information security.Identity authentication can guarantee the legitimacy of both parties,and prevent the occurrence of repudiation in the communication process.Information encryption can guarantee the data security,prevent data leakage and illegal elements stealing in the process of communication.At present,the security chips developed by foreign countries supporting international general cryptographic algorithms are widely used in our information security system,and the information security are facing enormous hidden dangers.The research shows that our self-developed national encryption chips can completely replace the foreign security chips in terms of function and security.Therefore,the application of self-developed national security chip is of great significance for the protection of national and individual information security.Under this background,this paper uses the self-developed national encryption chip as the main control chip,and designs a communication system which can realize identity authentication for both sides of communication,text document and image encryption.Firstly,the principle and implementation flow of SM2 digital signature algorithm,SM2 public key encryption algorithm,SM3 cryptographic hash algorithm and SM4 block cipher algorithm are introduced.And then the system development environment is introduced,including hardware development environment Altium Designer,software development environment CDS(C-Sky Development Suite)platform and MATLAB GUI design.The overall design and implementation of the system.Firstly by analyzing the requirements of the system,an end-to-end identity authentication and information encryption communication system is designed whose core is the self-developed national encryption chip.The design of the whole system is divided into three parts,including hardware circuit design,communication protocol design and software scheme design.The overall architecture of the system is given,the hardware platform design architecture and software implementation scheme are proposed as well.And the custom serial communication protocol and WIFI communication protocol are designed in detail.Then,based on the system hardware platform architecture,the hardware circuit design is divided into two parts,including MCU core circuit design and peripheral circuit design.The schematic and PCB design are carried out through the software Altium Designer,and the hardware platform components are soldered.Finally,software scheme of the system is designed in detail,including the principle and process of identity authentication,text document and image encryption as well as the analysis of security and encryption speed.For the functional testing and performance testing of the system,the testing platform of the system is built at first,and the application program is downloaded to the hardware platform development board.Then,we tested the various functions of the system,including WIFI testing,identity authentication testing,SM4 communication key generation testing,text document encryption communication testing and image encryption communication testing.Finally,we tested the performance of the system,including SM2 encryption and decryption rate,SM2 signature generation and verification rate,SM3 digest generation rate as well as SM4 encryption and decryption rate.The testing results indicate that the functions of the system are basically normal and the expected results of this paper can be basically achieved,which has a certain practical value.
Keywords/Search Tags:National encryption chip, National encryption algorithm, Identity authentication, Data encryption and decryption, Digital signature generation and verification
PDF Full Text Request
Related items