Font Size: a A A

Design And Implementation Of Encrypted Communication System Based On Domestic CPU

Posted on:2021-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:X L LiuFull Text:PDF
GTID:2518306050465824Subject:Navigation, guidance and control
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development and maturity of the Internet,domestic information security problems have been increasingly intensified.At present,many important departments and industrial control areas in my country are facing many information security threats.In view of the current information security issues facing China,in addition to implementing security control from the source of the generated data,it is also necessary to authenticate the device user,encrypt the transmission of the information generated by the device,and identify the user who receives the information Verify these aspects to ensure the security of the communication information from the source to the reception.This paper mainly proposes a national secret communication system based on domestic CPU.By designing a localized communication system hardware platform,combined with national secret algorithms SM2,SM3,SM4,this system is encrypted transmission and identity verification to ensure the identity of the host user during the communication process Authenticity,integrity of information and confidentiality.The digest algorithm SM3 and the symmetric cryptographic algorithm SM4 developed in my country are used to replace the international encryption algorithm,and the public key algorithm SM2 is used to replace the international algorithm RSA.This encrypted communication system includes software and hardware parts.It runs the domestically-successful Kirin LINUX operating system on a localized hardware platform,supports C/C++ programming development environment,and runs SM2,SM3,and SM4 national secret algorithms through the Open SSL library and Gm SSL platform.On the localized hardware platform,the safety of the domestic communication system is realized.The innovation of this article is mainly reflected in the localization of the communication system,the identity authentication of the users who use the system,and the encryption of the data and key transmitted by the communication system and the digital signature using the national secret algorithm.The main work:1.Design the hardware platform based on the domestic CPU communication system.The main processor of the hardware platform uses the high-performance domestic Loongson 3A3000,and the bridge chip domestic Loongson 7A1000.2.Design the boot verification process based on this hardware platform system.Design a physical key for the host.Only users with this legal key can log in to the system.This design can effectively restrict users who access the information system and ensure the security of the host.3.The communication data is encrypted based on the national secret algorithm.The symmetric algorithm SM4 is used to encrypt the communication session.The sender combines the public key algorithm SM2 and the digest algorithm SM3 to encrypt the transmission and digital encryption of the algorithm SM4 communication key and communication ciphertext.Signature.After receiving the information,the receiver performs signature verification to determine the source of the information,so as to identify the authenticity of the information and ensure the integrity of the communication data.4.Combine the hardware and software system to build a test environment to realize the identification of the host of the communication system,the SM4 encrypted transmission test,and the SM2 algorithm to sign and verify the information.The experimental results show that the power-on key designed by this system can accurately identify the user identity of the host,realize the encrypted transmission of data and verify the identity of the sender.The encryption/decryption rate of this system can reach 74.67 Mbps,the signature rate can reach 602 times/second,the verification rate can reach 256 times/second,the rate of generating random numbers is about 2Mbps,and the hash rate is 20 Mbps.
Keywords/Search Tags:Authentication, Encryption and decryption, Localization rate, SSL protocol
PDF Full Text Request
Related items