期刊文献+

分组密码算法的可重构设计模型与结构分析 被引量:1

Reconstructure Design Model and Structure Analysis for Block Cipher Algorithm
下载PDF
导出
摘要 针对在一种密码芯片上实现多种分组密码算法的要求,提出了基于可重构设计方案。重点研究了可重构设计模型,以及重构模型中的网络互联结构的设计。通过对比分析给出了适合于多种密码算法实现的具有高效可重构设计模型和互联结构。由对比性实验测试表明:设计的重构模型和结构,在实现四种分组密码算法时使用的资源数比实现单一一种密码算法最多增加了20%;实现的性能比单一一种密码算法的性能至多低15%。相对于同时在一个芯片上实现四种分组密码算法的设计方案,可重构模型总体的性价比优势非常明显。 This paper proposes a reconstructure design model according to the requirements which ask for realizing the multiple block cipher algorithm on a single cipher chip. Reconstructure design model as well as the network interconnection structure design in the model is focused on. By contrastive analysis, the design model and interconnection structure featured in highly efficient reconstructure are given. The contrastive test shows that the model increases by 20% sources at most in realizing the four kinds of block ciphers when compared with realizing the single one, and the performance it can reach is 15% lower at most than the single cryptographic algorithm. As a result, the overall performance - price ratio of reconstructure design is obviously superior to that of adopting four kinds of block ciphers on a single chip at the same time.
作者 何乃味
出处 《河池学院学报》 2012年第5期98-103,共6页 Journal of Hechi University
基金 广西教育厅科研基金资助项目(200103YB168)
关键词 重构设计 分组密码 模型 互联结构 性价比 reconstructure design block cipher model interconnection structure performance - priceratio
  • 相关文献

参考文献13

二级参考文献93

  • 1曲英杰,刘卫东,战嘉瑾.可重构密码协处理器简介及其特性[J].计算机工程,2004,30(13):166-168. 被引量:7
  • 2Matthews R. On the derivation of a chaotic encryption algorithm.Cryptologia, 1989,Ⅷ (1): 29-42.
  • 3Habutsu T, Nishio Y- Sasase I, et al. A secret cryptosystem by iterating a chaotic map. In: Advance in cryptology - EUROCRYPT'91, LNCS 547 (Springer Verlag, Berlin),1991. 127-140.
  • 4Biham E. Cryptanalysis of the chaotic-map cryptosystem suggested as EUROCRYPT' 91. In: Advance in cryptology - EUROCRYPT'91, LNCS 547 (Springer-Verlag, Berlin), 1991. 532-534.
  • 5Kocarev L, Jakimoski G. Logistic map as a block encryption algorithm. Phys Lett A, 2001, 289 (4-5), 199-206.
  • 6Wong K W. A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A, 2002, 298(4): 238-242.
  • 7Murali K. Heterogeneous chaotic systems based cryptography.Phys Lett A, 2000, 272:184-192.
  • 8Schneier B.应用密码学一协议、算法与C源程序.吴世忠,祝世雄,张文政,等译.北京:机械工业出版社,2000.
  • 9Pareek N K, Patldar V, Sud K K. Discrete chaotic cryptography using external key. Phys Lett A,2003,309(1-2): 75-82.
  • 10GOST R 34. 11-94, Gosudarstvennyi Standard of Russian Federation. Information technology. Cryptographic Data Security. Hashing function. Government Committee of the Russia for Standards, 1994.

共引文献57

同被引文献14

  • 1Huang Wei, Han Jun, and Wang Shuai. A low-complexityheterogeneous multi-core platform for security SoC[C]. IEEEAsian Solid-State Circuits Conference, Beijing, 2010: 1-4.
  • 2Goldstein S C, Schmit H, and Moe M. PipeRench: acoprocessor for streaming multimedia acceleration[Jj. ACMSigarch Computer Architecture News, 1999, 27(2): 28-39.
  • 3戴紫彬.面向分组密码处理的协处理器体系结构研究与设计实现[D]. 1博士论文解放军信息工程大学,2007.
  • 4Wu L, Weaver C, and Austin T. Cryptomaniac: a fast flexible architecture for secure communication[C]. The 28th Annual International Symposium on Computer Architecture, G6teborg, Sweden, 2001: 110-119.
  • 5Elbirt A J and Paar C. Instruction-level distributedprocessing for symmetric-key cryptography [J]. IEEETransactions on Parallel and Distributed System, 2005, 16(5):468-480.
  • 6曲英杰.可重组密码逻辑的研究与设计[D],[博士论文],北京科技大学,2002.
  • 7Buchty R. Cryptonite: a programmable crypto processorarchitecture for high-bandwidth applications[D]. [Ph.D.dissertation], Institut fur Informatik der TechnischenUniversitat Munchen, 2002.
  • 8孟涛,戴紫彬.分组密码处理器的可重构分簇式架构[J].电子与信息学报,2009,31(2):453-456. 被引量:14
  • 9杨晓辉,戴紫彬,张永福.可重构分组密码处理结构模型研究与设计[J].计算机研究与发展,2009,46(6):962-967. 被引量:20
  • 10李可长.基于FPGA可重构快速密码芯片设计[J].计算机测量与控制,2011,19(7):1665-1667. 被引量:3

引证文献1

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部