Design and Implementation of Reconfigurable Encryption and Decryption System Based on SOPC

Article Preview

Abstract:

The system is based on DES/3DES, AES cipher algorithm as the research object.According to the characteristics of the algorithm, designs a configuration mode which can share resource in space and configurate algorithm in time. Then it uses hardware description language Verilog HDL to realize and optimize the design, and completes a custom reconfigurable DES/3DES/AES encryption/decryption IP core. By SOPC technology, the IP core, Nios II processor, network controller and other function. The design hardware structureis simple, flexibility, security, which can be widely used in the field of informationsecurity.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2979-2982

Citation:

Online since:

August 2013

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] WANG Jian-yu, ZHANG Lu-guo. Reconfigurable Design and Efficient Implementation for AES and SMS4 Algorithm. Computer Engineering, 2008, 34(15): 159-161.

Google Scholar

[2] LIU Ze-wen, TANG Liu-chun. Design and Implementation of Security Network Adapter Based on SOPC. Computer Engineering , 2008, 34(1): 150-152.

Google Scholar

[3] ZHANG Wei-ping, ZHAO Ga, SHU Ping-ping, YANG Jun. The design and implementation of a configurable security network adapter on chip, 2012, 34(14): 246-250.

Google Scholar

[4] PANG Zheng-yuan, JIANG Jing-fei. Research and Design of Symmetric Cipher Processing Architecture. cipher processing subword parallism operation linking, 2007, (5): 796-800.

Google Scholar

[5] Yang Xiaohui, Dai Zibin. Research and Design of Reconfigurable Computing Targeted at Block Cipher Processing. Journal o f Computer Resear ch and Dev elo pment, Journal o f Computer Resear ch and Dev elo pment , 2009, 46(6): 962-967.

Google Scholar

[6] QIU Wei-xing, XIAO Ke-zhi, NI Fang, HUANG Hua. DES Key Extension Method. Computer Engineering , 2011, 37 (5): 167-171.

Google Scholar

[7] Lianqing ZHAO, Miaoying ZHAO. The Application of DES Algorithm in Experimental Teaching of Intelligent Management System[C]. Proceedings of 2011 National Teaching Seminar on Cryptography and Information Security, 2011: 153-155.

Google Scholar

[8] LI Ai-Ning, TANG Yong. Optimization of 3DES Cryptography Algorithm Based on Python. Computer Systems& Applications, 2011, 20(8): 184-187.

Google Scholar

[9] Fips-197, advanced encryption standard, National Institute of Standards and Technology (NIST). (2001).

Google Scholar

[10] Chen Yicheng, Zou Xuecheng, et al. Energy-efficient and security-optimized AES hardware design for ubiquitous computing[J]. Journal of Systems Engineering and Electronics, 2008, 19 (4): 652-658.

DOI: 10.1016/s1004-4132(08)60134-6

Google Scholar