| 研究生: |
柯宏親 Hung-Chin Ke |
|---|---|
| 論文名稱: |
先進加密標準演算法之IP模組元件設計與驗證 IP reuse design and Verification for Advance Encryption Standard algorithm |
| 指導教授: |
歐石鏡
Shih-Ching Ou |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 電機工程學系 Department of Electrical Engineering |
| 畢業學年度: | 90 |
| 語文別: | 英文 |
| 論文頁數: | 80 |
| 中文關鍵詞: | 影像加密 、矽智財產權 、場控邏輯閘陣列 、先進加密標準 |
| 外文關鍵詞: | FPGA, Reuse, IP, Image encryption, AES |
| 相關次數: | 點閱:16 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
為了要加速系統晶片之設計,智產設計之再利用(IP reuse)成為必需之工具及技術,本論文針對Advance Encryption Standard (AES) 演算法的特性,利用IP reuse 的概念去設計出一個高效率的128位元的區塊加密器(AECs),這個加密器之throughput 可以逹到1163Mb/s,我們採用加解密核心分開設計,以增加系統的彈性並利用平行處理的架構和回授電路的設計,有效可以加快加解密速度和降低硬體的複雜度並設計一個 4 clocks 存取的移位暫存器去減少I/O pins 接腳數,以致不會造成成本之浪費.
我們利用VHDL,Synplify,ModelSim,MaxplusII,and Quartus II來設計,合成及模擬AECs,最後使用Field Programmable Gate Array(FPGA)來實現,其加密核心之Logic element(LE)總數為1437,其工作頻率為100MHz,資料處理量約為1163Mbps,解密核心之LE總數為1895個,其工作頻率為90MHz,資料處理量為900Mb/s,根據此特性應用在影像來逹成加解密的效果.
In order to speed up the pace of system on a chip (SOC) development, designers intend to integrate intellectual properties (IP) into the chip. IP in chip design industry refers to pre-designed and pre-verified building blocks that can be reused for faster time-to-market. In this thesis, the research is focus on the characteristic of Advance Encryption Standard (AES). Using the IP reuse concept of AES to implement the 128bits block cipher efficiently and increase flexibility of Encryptor / Decryptor, we design Encryption Core and Decryption Core separately. Moreover, because the AES algorithm is the iterative encryption algorithm, we just only design one encryption/decryption architecture, pipeline architecture and using the feedback circuit to reduce the hardware complexity. In order to reduce the I/O pins, we design the shift register with four clocks cycles imports the Plaintext 128 bits and Secret Key 128 bits.
To realize the AECs, we use VHDL, Synplify, ModelSim, and MaxplusII for designing, synthesizing and simulation. Field Programmable Gate Arrays (FPGAs) are chosen as our target hardware environment. The encryption core design of AECs for area requires 1437 logic cells. The maximum operating clock is 100Mhz and the corresponding data throughput is about 1163Mbit/s. the decryption core design of AECs for area requires 1895 logic cells. The maximum operating clock is 90Mhz and the corresponding data throughput is about 900Mbit/s. According to the characteristic, we can apply to the field of Image encryption.
BIBLIOGRAPHY
[1] “National Bureau of Standards – Data Encryption Standard,” FIPS Publication 46,1977.
[2] M.Shand and J.Vuillemin, “Fast Implementations of RSA Cryptography,” in Proceedings. 11th Symposium on Computer Arithemtic, pp. 252-9,1993.
[3] Joan Daemen and Vincent Rijmen, AES Proposal: Rijndael, AES algorithm
Submission, September 3, 1999, available at
http:// csrc.nist.gov/publications/ /fips/fips197/fips-197.pdf
[4] Michael Keating and Pierre Bricaud, “Reuse Methodology Manual for system on a chip designs second edition,” May 1999.
[5] J. Buchholz, “Matlab implementation of AES standard,” November 29, 2001
http://buchholz.hs-bremen.de.
[6] Viktor Fischer, “Realization of the Round 2 AES Candidates using Altera FPGA,” MICRONIC s. r. o., Dunajská 12, Košice, Slovakia.
http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html
[7] P. Chodowiec, K. Gaj, “Implementation of the Twofish Cipher Using FPGA Devices”, Technical Report, George Mason University, July 1999.
[8] Piotr Mrocozkowski, “Implementation of the block cipher Rijndael using
Altera FPGA”, May, 2000 http://csrc.nist.gov/encryption/aes/round2/pubcmnts.htm
[9] AES home page: http://www.nist.gov/aes/.
[10] Hung Chin Ke,” Enhancing Compression and Encryption of image with FPGA-based Cryptosystems”, Applied informatics international symposium on software engineering,databases, and applications, February 18-21,2002, Innsbruck,Austria, Page(s): 187-192.
[11] B. Schneier, “Applied Cryptography Second Edition,” John Wiley & Sons, 1996.
[12] Altera Digital Library 2001.
[13] Munteanu, A.; Cornelis, J.; Van Der Auwera, G.; Cristea, P.,” Wavelet image compression - the quadtree coding approach”, Information Technology in Biomedicine, IEEE Transactions on , Volume: 3 Issue: 3 , Sept. 1999 Page(s): 176 –185.
[14] Bing-Bing Chai, Xinhua Zhuang, ”Significance-Linked Connected Component Analysis for Wavelet Image Coding”
[15] Viktor Fischer, “ Realization of the Round2 AES Candidate using Altera FPGA http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html
[16] James Nechvatal, et al., Report on the Development of the Advanced Encryption Standard (AES), National Institute of Standards and Technology.
[17] Benjamin Leperchey,Charles Hymans, “FPGA implementation of the Rijndael algorithm” June 16,2000.
[18] A JAVA servlet implementation, by Cass Crockatt. , A Visual Basic implementation , by P. Fresle, An implementation in C++, by Gerhard Wesp.
[19] The architecture of AES can be found, http://www.esat.kuleuven.ac.be/~rijmen/rijndael/
[20] R. Rivest, A.Shamir, and L. Adleman, ” A method for obtaining digital signatures and public key cryptosystems,” Communications of the ACM, vol.21, no.2, pp.120-126, Feb.1978.
[21] Philip P. Dang and Paul M.Chau, ”Image encryption for secure internet multimedia applications ” Consumer Electronics, IEEE Transactions on, Volume: 46 Issue: 3, Aug. 2000 Page(s): 395 –403.
[22] Cheng, H.; Xiaobo Li,” Partial encryption of compressed images and videos” Signal Processing, IEEE Transactions on , Volume: 48 Issue: 8 , Aug. 2000 Page(s): 2439 –2451.
[23] X.Li,J.Knipe, and H.Cheng,” Image compression and encryption using tree structures, ”Patt.Recogn.Lett.,vol.18,no.11-13,pp.1253-1259,Nov.1997.
[24] C.E. Shannon, “A Mathematical Theory of Communication”, Bell system technical journal, vol.27, no.3, pp.379, 1948.
[25] Shapiro, J.M.,” Embedded image coding using zerotrees of wavelet coefficients”, Signal Processing, IEEE Transactions on , Volume: 41 Issue: 12 , Dec. 1993 Page(s): 3445 –3462.
[26] Zhong, J.M.; Leung, C.H.; Tang, Y.Y.,” Wavelet image coding based on significance extraction using morphological operations”, Vision, Image and Signal Processing, IEE Proceedings- , Volume: 146 Issue: 4 , Aug. 1999 Page(s): 206 –210.
[27] Servetto, S.D.; Ramchandran, K.; Orchard, M.T.,” Wavelet based image coding via morphological prediction of significance”, Image Processing, 1995. Proceedings., International Conference on , Volume: 1 , 1995 Page(s): 530 -533 vol.1.
[28] Said, A.; Pearlman, W.A.,” A new, fast, and efficient image codec based on set partitioning in hierarchical trees”, Circuits and Systems for Video Technology, IEEE Transactions on Volume: 6 Issue: 3 , June 1996 Page(s): 243 –250.
[29] Jan-Ruei Lin, “Design of Encryption Chips Using the Blowfish Algorithm,” Master Thesis, Central University, 2000.
[30] Pei-Jung Wu“VLSI Implementation and IP Design for Advanced Encryption standard”,Master Thesis, Tung Hwa University 2001.
[31] Yeh, Bi-Yun, “IP-Based Chip Design Methodology”,Matster Thesis, Taiwan University,1996