期刊文献+

DES和LFSR混合加密的研究与FPGA实现

Research on Mixed Encryption of DES and LFSR and FPGA Implementation
下载PDF
导出
摘要 随着网络信息交流量日益增长,信息安全问题成了网络资源应用的发展瓶颈。本文针对计算机与网络上文件的安全性问题,对DES算法以及LFSR密码生成算法进行研究,设计了基于DES和线性反馈移位寄存器(LFSR)的混合加密算法并通过FPGA实现,FPGA根据用户输入的密码组合,通过线性反馈移位寄存器产生一串密钥,然后通过USB将这串密钥发送至计算机中。上位机软件实现与下位机的USB通讯、用DES算法对任意文件进行加密和解密的功能。结果表明,该方案对任意文件加密效果好、速度较快,对于网络空间文件保护有较好的效果。 With the growing of network information, the issue of information security has become the bot-tleneck of the development of network source application. This paper aimed at file’s security in the computer and Internet, and researched on DES encryption algorithm and the algorithm of LFSR. Based on above algorithms, we designed a mixed encrypted method realized by FPGA;according to the password combination that is inputted by the user, a bunch of keys will be produced by LFSR and sent to computer by USB. The function of software on the computer is communicating with USB chip and encrypting files with DES algorithm. The results showed that this scheme has good effect and high processing speed on encrypting any certain files, and has a good effect for protecting files on network space.
出处 《计算机科学与应用》 2015年第4期125-132,共8页 Computer Science and Application
基金 国家科技支撑计划项目(2014BAH28F04) 湖南省重点学科 湖南省高校科技创新团队 湖南省教育厅科学研究项目(14C0031) 湖南省教学改革研究项目(湘教通[2013]223号)。
  • 相关文献

参考文献5

二级参考文献69

  • 1冯志刚,马超.浅谈云计算安全[J].科技风,2010(4). 被引量:5
  • 2李满意.云计算安全面临挑战——访国家信息化专家咨询委员会委员沈昌祥院士[J].保密科学技术,2011(3):6-9. 被引量:7
  • 3谢永乐,孙秀斌,王玉文,胡兵,陈光.数字集成电路的混合模式内建自测试方法[J].仪器仪表学报,2006,27(4):367-370. 被引量:13
  • 4高军涛,董丽华,胡予濮.广义互缩生成器[J].计算机学报,2006,29(6):936-943. 被引量:4
  • 5Huang R W, Gui X L, Yu S, Zhuang W. Study of privacypreserving framework for cloud storage. Computer Science and Information Systems, 2011, 8(3):801-819.
  • 6Liu Q, Wang G J, Wu J. An efficient privacy preserving keyword search scheme in cloud computing//Proceedings of the 12th IEEE International Conference on Computational Science and Engineering (CSE' 09). Vancouver, Canada, 2009:715-720.
  • 7Bonech D, Crescenzo G D, Ostrovsky R, Persiano G. Public-key eneryption with keyword search//Proceedings oI the Eurocrypt 2004. Interlaken, Switzerland, 2004: 506-522.
  • 8Song D X, Wagner P, Perrig P. Practical techniques for searches on encrypted data//Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2000:44-55.
  • 9Wang W C, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago, Illinois, USA, 2009:55-66.
  • 10Bellovin S M, Cheswick W R. Privacy-enhanced searches using encrypted bloom filters. Technical Report 2004/022, IACR ePrint Cryptography Archive, 2004.

共引文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部