首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 62 毫秒
1.
音频传输技术作为电台传输高质量音频的关键技术,近年来发展迅速.本文在介绍了目前主流基于以太网的数字音频传输技术的基础上,对AES67协议进行了深入的研究分析,最后展望了AES67协议未来的发展前景.  相似文献   

2.
旁路攻击技术是对密码安全的严重威胁,其作用过程在于利用了密码软硬件实现上的特性而降低了密码分析的复杂性。AES作为目前与未来加密的主要标准,其安全性具有特殊重要的意义。然而,近期的研究表明,主流计算平台上的AES加密程序,很可能会遭受基于Cache所泄漏的运行信息而导致的攻击。本文依据相关的研究,介绍了基于Cache的AES攻击的原理,描述了其现状与发展,分析了这种攻击的现实可行性,并且,说明了反制攻击的措施建议。  相似文献   

3.
李涛  成晓雄  王文华  周健 《电信科学》2009,25(12):100-104
本文介绍了GPON中嵌入AES算法的过程以及AES加解密算法。对AES 计数器模式在GPON中的FPGA实现给出了优化的解决方案,详细介绍了一种轮间流水和轮内流水复用,控制简单的AES的实现方法,并给出了关键时序图和综合结果。  相似文献   

4.
一种GPON-AES的FPGA优化实现   总被引:1,自引:0,他引:1  
李涛  王勇  周健 《电信网技术》2010,(10):53-57
介绍了GPON中嵌入AES算法的过程以及AES加解密算法。对AES计数器模式在GPON中的FPGA实现给出了优化的解决方案,详细介绍了一种轮间流水和轮内流水复用,控制简单AES的实现方法,并给出了关键时序图和综合结果。  相似文献   

5.
一种应用于GPON的AES加密流水线实现方法   总被引:1,自引:1,他引:0  
介绍了AES加密的算法过程及应用于GPON中的AES加密技术,针对传统的AES加密实现方法应用于GPON中的所存在的问题,提出了一种AES加密的五级流水线电路实现方法,并用硬件描述语言编程实现.通过仿真和综合,结果表明该方法完全可行并十分有效.  相似文献   

6.
基于AES算法的WLAN安全机制分析   总被引:4,自引:0,他引:4  
高级加密标准(AES)加密算法Rijndael采用对称的块加密技术,提供比WEP/TKIP中RC4算法更高的加密性能,它将成为取代WEP的新一代的加密技术,为无线网络带来更强大的安全防护.文章主要讲述了AES加密算法,在分支编码本(OCB)模式下的AES加密机制原理,AES算法在WLAN中的应用,以及现有的一些针对AES算法的攻击方法.  相似文献   

7.
文中介绍了高级加密算法(AES)的基本原理,并给出了基于AES算法硬件加密模块设计方案.通过Modelsim6.le对其进行仿真实现,仿真结果表明,该加密模块能够很好的实现AES算法.  相似文献   

8.
差分功耗分析是破解AES密码算法最为有效的一种攻击技术,为了防范这种攻击技术本文基于FPGA搭建实验平台实现了对AES加密算法的DPA攻击,在此基础上通过掩码技术对AES加密算法进行优化与改进。通过实验证明改进后的AES算法能有效的防范DPA的攻击。  相似文献   

9.
为了提升AES的性能,本文采用轮内流水线技术进行AES硬件设计。在对AES轮单元复杂的字节代换/逆字节代换、列变换/逆列变换进行了算法分析的基础上,进行了AES轮单元的轮内7级流水线设计。特别是采用常数矩阵乘积形式和复用列变换进行了逆列变换设计,降低了硬件资源的占用。采用Xilinx ISE10.1工具进行了各个型号FPGA的硬件实现,实验数据表明文中提出的硬件实现方案提升了AES的数据吞吐率与吞吐率/面积比。  相似文献   

10.
GPON中的AES加密   总被引:1,自引:0,他引:1  
文章简单的介绍了GPON的体系结构与下行帧的结构,并着重介绍了AES加密的流程、方法与具体算法,最后对GPON中的AES加密、解密方法及AES计数器模式在GPON中的使用进行了详细的介绍。  相似文献   

11.
伴随着音频信号传输技术的飞速发展,Audio over IP正全面进入音频技术领域,正成为广播电视数字音频技术行业发展的未来方向。本文首先以行业技术面临的新问题与“Audio over IP”的网络技术优势为出发点进行分析,进而通过解读AES 67基本协议规定内容,具体了解该标准的设计理念与目的。  相似文献   

12.
可重构密码芯片提高了密码芯片的安全性和灵活性,具有良好的应用前景,但其处理速度较ASIC实现的专用密码芯片却有很大程度的下降。在此分析AES和SMS4密码算法的可重构性,利用流水线、并行处理和可重构技术,提出了一种可重构体系结构。基于该体系结构实现的AES和SMS4算法较其他同类设计相比,在资源规模相当的情况下,处理速度有了较大的提高。  相似文献   

13.
贾宁 《现代电子技术》2007,30(11):59-61
对密码算法进行了概述和分类,并在此基础上论述了密码算法的现状。在哈希函数方面,研究了在MD5和SHA-1被破解后HMAC的健壮性是否变化;在对称密钥算法方面,论述了AES的特点并将其与DES,3DES及IDEA进行了比较;在非对称密钥算法方面,比较了RSA,DSA和ElGamal,并且详细说明了ECC。最后对密码算法的发展进行了展望。  相似文献   

14.
一种可重构体系结构用于高速实现DES、3DES和AES   总被引:1,自引:2,他引:1       下载免费PDF全文
高娜娜  李占才  王沁 《电子学报》2006,34(8):1386-1390
可重构密码芯片提高了密码芯片的安全性和灵活性,具有良好的应用前景.然而目前的可重构密码芯片吞吐率均大大低于专用芯片,因此,如何提高处理速度是可重构密码芯片设计的关键问题.本文分析了常用对称密码算法DES、3DES和AES的可重构性,利用流水线、并行处理和可重构技术,提出了一种可重构体系结构.基于该体系结构实现的DES、3DES和AES吞吐率在110MHz工作频率下分别可达到7Gbps、2.3Gbps和1.4Gbps.与其他同类设计相比,本文设计在处理速度上有较大优势,可以很好地应用到可重构密码芯片设计中.  相似文献   

15.
铝焊垫表面残留物的检测是确保铝焊垫质量的重要指标.俄歇电子能谱仪(AES)由于检测区域小、表面分析灵敏度高,被广泛用于集成电路(IC)芯片制造中铝焊垫的表面成分分析,但荷电效应的存在常常会影响俄歇分析的结果.铝焊垫分析过程中,消除或者减少荷电效应是保证俄歇分析结果正确的前提.从优化俄歇电子能谱仪分析条件(比如降低入射电压、倾斜样品载物台、Ar+离子中和)和使用辅助方法改善样品导电性两大方面,介绍了几种减少荷电效应的有效方法,提出了铝焊垫俄歇分析的基本流程.结果表明,此分析流程能有效提高分析效率,为业内俄歇分析人员提供借鉴.  相似文献   

16.
IP-based radio access networks (RAN) are expected to be the next generation access networks in UMTS and CDMA networks. The question of connectivity, i.e., how best to connect base stations to the radio network controllers (RNC) in an IP-based RAN, has not been addressed by researchers. Furthermore, given a connection configuration, an RNC selection algorithm that assigns an incoming call to an RNC is also necessary. This paper examines RAN connectivity and its impact on the performance and resiliency of the wireless network using different RNC selection algorithms. For homogeneous networks, we show that the proposed min-load-1 algorithm, which allows at most one hard handoff in order to accommodate each incoming call request, delivers performance close to the optimal algorithm. We also show that allowing a few base stations to connect to two RNCs (a 10 percent increase in the number of links in our network) results in resiliency to RNC failures that is comparable to the resiliency of RANs with full-mesh connectivity. Finally, for heterogeneous networks, we show that the min-load-k algorithm (with at most k hard handoffs per call) is effective in handling load imbalances. These results provide strong motivation for deploying IP-based RAN, as they suggest that enhancing current point-to-point RAN with few additional links and allowing a few hard handoffs to accommodate incoming calls can result in significant gains in performance and resiliency.  相似文献   

17.
This work discusses two approaches to incorporating error resiliency in the Simple Scalable Profile SSP of the ISO/IEC MPEG-4 14496-2 visual standard. As such scalable MPEG-4 is made suitable for deployment in a mobile communication environment. When it was defined in 2000, the syntax of the Simple Scalable Profile (SSP) prohibited the use of the error resiliency tools which were available in the base layer of the MPEG-4 codec. GPRS simulations are employed to illustrate the need for error resiliency in the SSP profile. Two solutions are then proposed based on whether or not bitstream syntax modifications are employed. The first solution is syntax friendly and emulates the use of the Video Packet resiliency tool whilst remaining compliant with standardized decoders. The limitations and constraints of such an approach are then elaborated upon. It is shown that syntax modifications are inevitable. Thus, the second solution proposes the syntax modifications to incorporate the error resiliency tools of the base layer into the enhancement layers of the SSP profile. The new syntax is verified through subjective testing using Multi Media Double Stimulus Continuous Quality Evaluation (MMDSCQE). Subsequently, the new syntax was approved by the ISO/IEC MPEG-4 committee and resulted in a new profile known as the Error Resilient Simple Scalable Profile (ER-SSP). It is shown that minor modifications are required in the Header Extension tool to synchronize the decoding process between the enhancement and the base layer. Thus, it is shown that base layer error resilience tools are equally applicable to the enhancement layer with nominal syntax changes.  相似文献   

18.
19.
It is an important challenge to implement a lowcost power analysis immune advanced encryption standard (AES) circuit. The previous study proves that substitution boxes (S-Boxes) in AES are prone to being attacked, and hard to mask for its non-linear characteristic. Besides, large amounts of circuit resources in chips and power consumption are spent in protecting S-Boxes against power analysis. Thus, a novel power analysis immune scheme is proposed, which divides the data-path of AES into two parts: inhomogeneous S-Boxes instead of fixed S-Boxes are selected randomly to disturb power and logic delay in the non-linear module; at the same time, the general masking strategy is applied in the linear part of AES. This improved AES circuit was synthesized with united microelectronics corporation (UMC) 0.25 μm 1.8 V complementary metal-oxide-semiconductor (CMOS) standard cell library, and correlation power analysis experiments were executed. The results demonstrate that this secure AES implementation has very low hardware cost and can enhance the AES security effectually against power analysis.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号