期刊文献+

基于汉明码校验的AES数据加密记录器设计

Design of AES encryption of data recorder with Hamming code for error- check- correct
下载PDF
导出
摘要 以FPGA为硬件设计平台,实现AES数据加密记录器,重点讲述了AES算法的FPGA实现。利用MATLAB软件完成算法的密钥扩展及S盒设计,使其在硬件中的设计简化为查表操作;整体算法的设计采用流水线技术,提高了加密速度。同时,设计了汉明校验码解决由于NAND Flash位翻转经加密后带来的误码扩散的问题,将最后的纠错工作设计在计算机上完成,降低对硬件读数的影响,同时提高了系统的可靠性,该设计具有一定实用价值。 hnplemented with FPGA, the paper proposes a method to design data recorder with AES encryption, which is sim- plified with the encryption work partly done by MATLAB that is the key expansion and Subbyte box, and which is accelerated with Pipelining design. Also, Error-Check-Correct scheme is implemented in the system to resistance the error propagation problem and strengthen reliability. The final data correct work is finished on the PC to reduce its influence on the hardware reading speed.
出处 《电子技术应用》 北大核心 2015年第1期118-121,共4页 Application of Electronic Technique
基金 国家自然科学基金项目(51275491)
关键词 高级加密标准 汉明码 FPGA NAND Flash AES Hamming code FPGA Nand Flash
  • 相关文献

参考文献3

二级参考文献23

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks [J]. Wireless Networks, 2002, 8(5):521-534.
  • 3Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks [C]// 2nd ACM SensSys, 2004,162-175.
  • 4Gura N , Patel A , Wander A , et al. Comparing Elliptic Curve Cryptography and R SA on 8-bit CPUs[C]//Workshop on Cryptographic Hardware and Embedded Systems, 2004, 119-132.
  • 5Malan D J, Welsh M, and Smith M Do A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//IEEE International Conference on Sensor and Ad Hoe Communications and Networks, Santa Clara, California, 2004,71-80.
  • 6Zhang Y, Liu W, Lou W, and Fang Y. Securing Sensor Networks with Location-Based Keys[C]// IEEE Wireless Communications and Networking Conference. 2005, 1909-1914.
  • 7Doyle B, Bell S, Smeaton A F, McCusker K, et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks [J]. The Computer Journal, 2006, 49(4): 443-453.
  • 8McCusker K, Connor N, and Diamond D. Low-Energy Finite Field Arithmetic Primitives for Implementing Security in Wireless Sensor Networks[J]. Communication, Circuits And Systems Proceedings, 2006,1537-1541.
  • 9Oliveira L B, Dahab R, Lopez J, et al. Identity-Encryption for Sensor Networks[C]// 3rd IEEE PerCom Workshop on Pervasive Wireless Networking, March 2007,876-884.
  • 10Watro R, Kong D, at al. TinyPK..Securing Sensor Networks with Public Key Technology[C]//SASN' 04 (ACM), Washington DC, 2004, 322-339.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部