Dissertation > Excellent graduate degree dissertation topics show

The Research and FPGA Implementation of Data Encryption Algorithm Based on Chaos Sequences

Author: LiJie
Tutor: LiYan
School: Harbin University of Science and Technology
Course: Computer Software and Theory
Keywords: Chaos Subkeys Key Space Field Programmable Gate Array
CLC: TP309.7
Type: Master's thesis
Year: 2013
Downloads: 18
Quote: 0
Read: Download Dissertation

Abstract


With the development of network communication, people has paid more andmore attention on information security. Data encryption algorithm DES as blockencryption algorithm of typical, although has been exhaustive method to break,but because of the widely application of DES encryption, or have very goodfoundation, so now people are still very keen on it, trying to find solutions,extended DES key space, so the cipher text is more random, more independent,more safety, of course, more in line with the current needs of the society.This paper presents a method to extend DES algorithm based on chaoticsequences of the key space, thus a kind of chaotic deformation DES algorithm.Using a field programmable gate array (FPGA) as the hardware platform, usinghardware description language (VHDL) to realize the design of the wholesystem. Chaotic system only exists in nonlinear system, the randomness of initialvalue sensitivity and, to generate random numbers, have good application valuein the field of cryptography. Processed by chaotic sequence generated by Logisticchaotic mapping to the DES of the round key, each wheel to generate the DESalgorithm ’s key is different, DES algorithm is that chaos deformation has infinitekey space and the "one-time" feature, greatly improve the robustness of thealgorithm.In the part of design data encryption algorithm based on chaotic sequence,focuses on the chaotic sequence generated16wheel key module, single iterationcalculation module, S box transformation module, control module and moduledesign process. Methods through simulation and adaptation in the XilinxVirtex-II xc2vp30chip, has completed the hardware debugging, the runningresults show that, the hardware implementation of the encryption/decryptionalgorithm to function correctly, speed.

Related Dissertations

  1. Research on synchronization control of chaotic systems,O415.5
  2. With Delay fishing items and based on the ratio of prey - predator model,O175
  3. Research on Some Dynamic Characteristics of Complex Rotor System,TH113
  4. Research on Limit-Factors in IC Design-Tool Application,TN402
  5. Chaos Synchronization and Chaos Control of Permanent Magnet Synchronous Motor,TM301.2
  6. Dynamics of Spiral Waves Driven by Complex External Force,O415
  7. Research on Reducing Electromagnetic Interference of Switching Mode Power Supply with Chaotic Methods,TN86
  8. Steady-state Identification and Optimization of Grinding Process,TD921.4
  9. Study, Implementation and Application of Adaptation Technologies in IP Over WDM,TN929.1
  10. Design of Global Clock Distribution and TDC Module Based on FPGA,TN791
  11. Indoor Wireless Visible Light Communication System Based on Quadrature Amplitude Modulation,TN929.1
  12. Modular Design and Implementation of Multi-Channel NAND Flash Controller,TP333
  13. Research of Underwater Acoustic Communication Coding Based on FPGA,U666.7
  14. Study on the Power System Unit Commitment Problem,TM732
  15. Pattern Synthesis of Array Antenna Based on Chaos Immune Particle Swarm Optimization,TN820.12
  16. Research and Implementaion of Image Processing Algorithm Based on FPGA,TP391.41
  17. Convolutional code decoding algorithm and its FPGA implementation,TN791
  18. Lightning FPGA-based signal processing research,TN791
  19. FPGA-based 3G BERT Design and Research,TN929.5
  20. FPGA-based high-speed data acquisition system design,TP274.2
  21. Train emergency intercom unit fully digital hardware design and implementation,TP273

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile