Dissertation > Excellent graduate degree dissertation topics show

Research on Memory Confidentiality and Integrity Protection Technology in Single Processor Architecture

Author: ZhangJunQin
Tutor: GuDaWu
School: Shanghai Jiaotong University
Course: Computer System Architecture
Keywords: Memory Security Confidentiality protection Integrity protection One-time Hash tree Galois / Counter Mode
CLC: TP333
Type: Master's thesis
Year: 2010
Downloads: 31
Quote: 1
Read: Download Dissertation


Now , due to the presence of unsafe environmental factors , more and more attention on the protection of computer data . View of memory is the most important data resides spaces , so guard against attack first and foremost is to protect the processor chip memory , the key techniques including the confidentiality and integrity protection of the memory . The confidentiality of the memory to ensure data is not an attacker to steal ensure the integrity of data is not an attacker to tamper . This paper summarized the single processor architecture XOM and AEGIS system framework , and then introduced the existing memory confidentiality and integrity protection scheme , and compared and analyzed . In this paper, the the parity tree shortcomings pointed out that the existing hash based on integrity check design Bonsai Merkle Tree - based Parallel Bonsai Merkle Tree . First introduced the design concept of the algorithm , to improve the advantages of the program is to update the checksum tree to parallel computing ; and then analyze the security of the scheme , and to improve the program for simulation and analysis . Confidentiality and integrity protection combined the authentication function GCM mode to modify and extend , and then combined with the Parallel Bonsai Merkle Tree , the main idea of the program is the use of GCM parallel processing of the data block , and the delay of the authentication section overlap with the memory access latency ; improvements and analysis after the Cache parity tree replacement algorithm ; Finally, the program of the simulation analysis , the experimental results show that the improved solution in terms of efficiency to obtain a certain improved.

Related Dissertations

  1. The Design of Computer Forensics Model Based on Windows Log,D918.2
  2. Professor Li Shi seton surgery experience in the treatment of perianal abscess Xianping application is a one-time cut,R657.1
  3. Study on Lightweight Security Mechanism for SIP Based on Capabilities,TP393.08
  4. Hard security access control Research and Implementation,TP333.35
  5. Safety -oriented cloud computing terminal key technologies,TP309
  6. Implementation of a Single Sign on System Based on Various Authentications,TP393.08
  7. Research on the ASL-DHT Algorithm and Its Application in Data Outsourcing Model,TP338.8
  8. Taishun Local Residential integrity protection of the,TU-87
  9. The Application and Research of Spatiotemporal Chaos Theory in Identity Authentication,TP393.08
  10. The Research of Completely Vulnerable Watermark Algorithm Based on Wavelet Transform,TP309.7
  11. Securit Group Data Source Authentication Protocol Based on Error-correcting Code,TP393.08
  12. Design and Implementation of a Backup System Based on Data De-Duplication,TP309.3
  13. Sim-card Identity Authentication: A Case Study on Chinamobile,TP393.08
  14. Digital watermarking-based wireless sensor network data integrity protection research,TN929.5
  15. The Effects of Different Distribute Patterns of Delay Rewards on the Delay of Gratification of Three~Five Years Old Children,B844.1
  16. Design and Implementation of One-time Password Identity Authentication System Based on Digital Certificate,TP393.08
  17. Xunxian old city spatial pattern of integrity protection,TU984.114
  18. Research on the Space of Characteristics and Regeneration of Central City Old Residential District in Huazhuang Town of TaiHuxincheng,TU984.114
  19. The Research of Identity Authentication Based on Chaos Theory,TP309
  20. Design and Implementation of a New Authentication Mechanism Based on SIP,TP393.08
  21. The Performance Analysis and Simulation on Source Authentication Protocol in Multicast,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Electronic digital computer (not a continuous role in computer ) > Memory
© 2012 www.DissertationTopic.Net  Mobile