共查询到20条相似文献,搜索用时 109 毫秒
1.
MD5算法IP核的设计与实现 总被引:2,自引:0,他引:2
文章介绍了MD5算法,给出了IP核的整体架构及其重要模块的设计实现方案。最后分析了IP核的接口信号,并对IP核的性能进行了评估,给出了评估参数。 相似文献
2.
DES算法IP核通信机制的设计 总被引:1,自引:0,他引:1
通过分析数据加密标准(DES)的算法结构,给出了算法IP核通信机制的设计方案.通过对其通信机制分析设计,提高了通信双方传输有效数据的速度,最后对其进行时序分析并给出了它的性能参数. 相似文献
3.
4.
基于最优扫描结构的分形IP核设计 总被引:1,自引:1,他引:0
描述平板显示系统中最优扫描结构所对应的自相似分形拓扑结构图,提出分形扫描核心模块架构,分析n位分形扫描的递推结构,研究扫描过程中的子空间码与位码序列的关键特征,推导出序列生成的通用逻辑算法。在此基础上,设计了适合各种灰度等级的参数化的分形IP核并得到仿真结果,同时给出了分形IP核的系统应用,证明所设计的IP核可以有效提高灰度扫描的利用率和FPD画面质量。 相似文献
5.
6.
在网络通信系统中,流量控制器是实现通信业务量管制的关键电路,用于监视和控制信元的传输速率。针对多个连接共享带宽的流量控制使用需求,在分析虚调度算法的基础上,结合FPGA并行计算的特点,提出一个基于FP-GA的实时响应多通道并行流量控制IP核的实现方法,进行了仿真测试,给出了资源消耗和系统最高工作频率等结果。该IP核可应用于ATM和IP网络的流量控制。 相似文献
7.
8.
为了简化IP核的设计过程,本文介绍了一种基于FPGA的中值滤波算法的IP核实现方法.针对FPGA 的特点对实现方法进行了研究,从而简化了复杂算法的IP核设计问题.实验结果表明,该IP核设计方法具有设计周期短,可靠性高等特点. 相似文献
9.
10.
11.
Morioka S. Satoh A. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2004,12(7):686-691
In this brief, we present a high-speed AES IP-core, which runs at 880 MHz on a 0.13-/spl mu/m CMOS standard cell library, and which achieves over 10-Gbps throughput in all encryption modes, including cipher block chaining (CBC) mode. Although the CBC mode is the most widely used and important, achieving such high throughput was difficult because pipelining and/or loop unrolling techniques cannot be applied. To reduce the propagation delays of the S-Box, the slowest function block, we developed a special circuit architecture that we call twisted-binary decision diagram (BDD), where the fanout of signals is distributed in the S-Box circuit. Our S-Box is 1.5 to 2 times faster than the conventional S-Box implementations. The T-Box algorithm, which merges the S-Box and another primitive function (MixColumns) into a single function, is also used for an additional speedup. 相似文献
12.
功耗分析攻击是当前密码芯片中各类数据加密算法的主要安全威胁,尤其是对于迄今应用最为广泛的数据加密标准算法造成了严重的危害。通过分析数据加密标准算法遭受功耗分析攻击的原理,并结合针对数据加密标准算法关键防御技术,给出了一种基于互补电路的中间值掩码DES方案设计。主要是利用双电路进行互补输出,以保证寄存器翻转保持功耗恒定,从而最大限度地降低功耗差异。根据算法性能分析结果表明:该方案可以抵抗差分功耗分析攻击,且实现简单,能够直接应用于密码芯片的电路设计中。 相似文献
13.
14.
根据PDX体制构造一种计算机字长只有10位10进数的P3—4新型数据加密标准,解决与网络微机及硬件兼容问题,该加密标准具有NBS的公开加密算法要求指标及高强度安全性和重要的实用性。 相似文献
15.
An identity attribute–based encryption using elliptic curve digital signature for patient health record maintenance
下载免费PDF全文
![点击此处可从《International Journal of Communication Systems》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Providing security to the data that stored in personal health record (PHR) is an emerging and critical task in recent years. For this purpose, some of the encryption and key generation techniques are developed in the traditional works. But it has the drawbacks such as lacks in access control policies, reduced security, and ineffective. So this work implemented the efficient techniques, namely, elliptic curve Diffie‐Hellman for the secret key generation and identity attribute–based encryption for improving the security of the cloud data. Initially, the cloud user can request the patient's data to the PHR admin, and then they can generate the secret by using the elliptic curve Diffie‐Hellman algorithm. The key that used for encryption and decryption is generated by using the identity attribute–based encryption technique. Then, the access control is provided to the users based on their roles. The requested data are encrypted by applying the advanced encryption standard technique. After that, the elliptic curve digital signature algorithm is used to generate the digital signature for the encrypted data. Furthermore, it is verified with the user's digital signature; if it matches, the data can be accessed by the user with the help of advanced encryption standard decryption mechanism. Finally, the authenticated user can able to access the patient's data from PHR. In experiments, the performance of the proposed encryption and key generation technique is evaluated and compared with the existing techniques for proving the effectiveness of the implemented system. 相似文献
16.
目前的公钥加密方案受到来自量子计算的威胁,研究在量子计算下安全的公开加密算法具有重要的意义.本文提出了遍历矩阵的概念,并给出了遍历矩阵的性质.同时提出了基于有限域上遍历矩阵的双侧幂乘问题(TEME:Two-side Ergodic Matrices Exponentiation),并证明了求解TEME问题是NP完全的.据此,本文提出了一个新的公钥加密方案,并在标准模型下,证明了该方案基于TEME问题的安全性,即该方案具有适应性选择密文攻击下的不可区分性. 相似文献
17.
由于密码分析研究的进展及DES自身的弱点,原64比特的DES将不能作为数据加密的标准算法而长期存在。在原来工作的基础上,本文提出了256比特的分组密码方案。密码算法由基于混沌映射的数字滤波器构造。 相似文献
18.
AES算法的密码分析与快速实现 总被引:3,自引:0,他引:3
高级加密标准(AES)确定分组密码Rijndael为其算法,取代厂泛使用了20多年的数据加密标准(DES),该算法将在各行业各部门获得广泛的应用.文章以DES为参照对象,阐述了Rijndael算法的设计特色,介绍了AES在密码分析方面国内外已有的一些理论分析成果,描述了AES算法采用软件和硬件的快速实现方案. 相似文献
19.
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 相似文献
20.
基于混沌参数调制的数据加密算法 总被引:2,自引:2,他引:0
讨论了攻击混沌参数调制保密系统的两种策略,在此基础上提出一种两级调制的混沌映射数据加密算法,其中给数据又增加了一层反破解的混沌保护外壳.该方案生成的密文序列具有很强的复杂性,能隐藏参数数字调制的特征.在分析数据加密的过程中给出了仿真结果. 相似文献