Dissertation > Excellent graduate degree dissertation topics show
Research on Memory Confidentiality and Integrity Protection Technology in Single Processor Architecture
Author: ZhangJunQin
Tutor: GuDaWu
School: Shanghai Jiaotong University
Course: Computer System Architecture
Keywords: Memory Security Confidentiality protection Integrity protection One-time Hash tree Galois / Counter Mode
CLC: TP333
Type: Master's thesis
Year: 2010
Downloads: 31
Quote: 1
Read: Download Dissertation
Abstract
Now , due to the presence of unsafe environmental factors , more and more attention on the protection of computer data . View of memory is the most important data resides spaces , so guard against attack first and foremost is to protect the processor chip memory , the key techniques including the confidentiality and integrity protection of the memory . The confidentiality of the memory to ensure data is not an attacker to steal ensure the integrity of data is not an attacker to tamper . This paper summarized the single processor architecture XOM and AEGIS system framework , and then introduced the existing memory confidentiality and integrity protection scheme , and compared and analyzed . In this paper, the the parity tree shortcomings pointed out that the existing hash based on integrity check design Bonsai Merkle Tree - based Parallel Bonsai Merkle Tree . First introduced the design concept of the algorithm , to improve the advantages of the program is to update the checksum tree to parallel computing ; and then analyze the security of the scheme , and to improve the program for simulation and analysis . Confidentiality and integrity protection combined the authentication function GCM mode to modify and extend , and then combined with the Parallel Bonsai Merkle Tree , the main idea of the program is the use of GCM parallel processing of the data block , and the delay of the authentication section overlap with the memory access latency ; improvements and analysis after the Cache parity tree replacement algorithm ; Finally, the program of the simulation analysis , the experimental results show that the improved solution in terms of efficiency to obtain a certain improved.
|
Related Dissertations
- The Design of Computer Forensics Model Based on Windows Log,D918.2
- Professor Li Shi seton surgery experience in the treatment of perianal abscess Xianping application is a one-time cut,R657.1
- Study on Lightweight Security Mechanism for SIP Based on Capabilities,TP393.08
- Hard security access control Research and Implementation,TP333.35
- Safety -oriented cloud computing terminal key technologies,TP309
- Implementation of a Single Sign on System Based on Various Authentications,TP393.08
- Research on the ASL-DHT Algorithm and Its Application in Data Outsourcing Model,TP338.8
- Taishun Local Residential integrity protection of the,TU-87
- The Application and Research of Spatiotemporal Chaos Theory in Identity Authentication,TP393.08
- The Research of Completely Vulnerable Watermark Algorithm Based on Wavelet Transform,TP309.7
- Securit Group Data Source Authentication Protocol Based on Error-correcting Code,TP393.08
- Design and Implementation of a Backup System Based on Data De-Duplication,TP309.3
- Sim-card Identity Authentication: A Case Study on Chinamobile,TP393.08
- Digital watermarking-based wireless sensor network data integrity protection research,TN929.5
- The Effects of Different Distribute Patterns of Delay Rewards on the Delay of Gratification of Three~Five Years Old Children,B844.1
- Design and Implementation of One-time Password Identity Authentication System Based on Digital Certificate,TP393.08
- Xunxian old city spatial pattern of integrity protection,TU984.114
- Research on the Space of Characteristics and Regeneration of Central City Old Residential District in Huazhuang Town of TaiHuxincheng,TU984.114
- The Research of Identity Authentication Based on Chaos Theory,TP309
- Design and Implementation of a New Authentication Mechanism Based on SIP,TP393.08
- The Performance Analysis and Simulation on Source Authentication Protocol in Multicast,TP393.08
CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Electronic digital computer (not a continuous role in computer ) > Memory
© 2012 www.DissertationTopic.Net Mobile
|