USB安全钥模型设计与研究

上传人:飞*** 文档编号:28278467 上传时间:2018-01-16 格式:DOC 页数:58 大小:599.50KB
返回 下载 相关 举报
USB安全钥模型设计与研究_第1页
第1页 / 共58页
USB安全钥模型设计与研究_第2页
第2页 / 共58页
USB安全钥模型设计与研究_第3页
第3页 / 共58页
USB安全钥模型设计与研究_第4页
第4页 / 共58页
USB安全钥模型设计与研究_第5页
第5页 / 共58页
点击查看更多>>
资源描述

《USB安全钥模型设计与研究》由会员分享,可在线阅读,更多相关《USB安全钥模型设计与研究(58页珍藏版)》请在金锄头文库上搜索。

1、江 西 理 工 大 学 南 昌 校 区毕 业 设 计(论文)题 目:U SB 安 全 钥 模 型 设 计 与 研 究系 :专 业:班 级:学 生:学 号:指导教师: 职称: 摘 要随着信息技术的发展,特别是电子商务的发展,网络信息的安全传输问题逐渐成为人们最为关心和头痛的事情。密码安全芯片的研究与设计是当前密码学和微电子学交叉学科领域的热点问题。现代电子系统集成技术的快速发展和密码理论日趋完善,为安全芯片的诞生提供了强有力的支持。本文就在这种技术背景下,结合当前信息安全系统的需要,提出了一种基于 USB 接口技术的安全钥芯片的思想,并遵循片上系统先进的设计方法和工具,初步完成了 USB 安全钥

2、芯片的设计、实现及验证。本文针对这种问题,结合当前信息流通速度快的特点,提出了一种基于 USB 技术的硬件安全加密方法,并在此基础上进行了研究和设计。下面是本文主要的研究内容和研究成果的概述。首先对 USB 安全钥的基本知识进行了系统的概括和阐述,分析了 USB 安全钥的特点和功能,指出利用 USB 技术和密码学技术相结合是解决当前的安全问题的重要方法。在此基础上,本文构建了 USB 安全钥的系统模型,并对此模型的各部分进行了分析和研究,指出 USB 安全钥中最重要的密码协议的建立和密码方法的选择。对当前主流密码体制进行了分析和研究。对公钥密码体制和私钥密码体制进行了分析和研究,并对这两种密码

3、体制进行了比较。对公钥密码体制和私钥密码体制的代表 RSA 和 DES,提出了 3DES 密码,并对 RSA 的安全性进行了分析,提出构造安全素数。结合公钥和私钥密码体制的特点,提出了利用 RSA 和 DES 来构建的混合密码体制。本文利用 VLSI 技术对 USB 安全钥进行了设计,将 USB 安全钥从功能的角度分为 USB 控制器设备和密码协处理器实现两个模块。运用片上系统(SOC)自底到顶的设计方法和电子设计自动化(EDA)工具实现了 USB 安全钥功能芯片。本文对适于在片上系统( SOC)上实现的混合密码体制进行了研究,分析了混合密码体制的安全性基础以及其在芯片中实现的可行性和优越性。

4、分析研究了混合密码体制在芯片中应用的许多相关问题如 RSA 密钥长度的选择等问题。同时我们考虑到在实际应用过程中,在满足安全性的前提下还应当降低计算复杂度,提高信息加、解密的速度,便于在芯片中实现,降低成本,利于推广应用等因素,进一步提出了基于 USB 安全钥芯片的数字签名和认证协议。这为以后密码安全专用芯片的研究和开发在理论和实际应用经验上提供很有价值的资料。在实际应用中,在混合密码体制中占有重要地位的 RSA 算法在芯片上实现时存在着计算复杂、运行速度慢的问题。目前国内外对 RSA 算法实现的研究大多是在运算速度很高的计算机上,在芯片中实现大多采用串行处理,这样虽然算法和硬件结构便于实现,

5、但是对于时钟频率相对较低的芯片来说,为提高速度,安全性必然相对较差,相反,为提高安全强度,则运算处理速度又会降低。本文基于这种矛盾,提出了在各个层次上并行实现混合密码体制的思想。尤其是对 RSA 算法的研究,并行思想渗透到其基本算法中,这些基本算法主要包括模加、模乘、模逆和模幂运算。大数运算是很费时间的,尤其是大整数的模逆和模幂运算。为了得到较快的加/解密速度,本文对这些基本算法进行了深层次的优化,大大提高了 RSA 算法实际应用时的运行速度和执行效率。关键词:USB 安全钥;密码体制;数字签名;身份认证;快速算法ABSTRACTAlong with the development of in

6、formation technology (IT), especially electronic business, the safety of information transmitting via Network is becoming the toughest matter about which is most concerned. Research and design of cript security chip is a very popular subject in the cross field between criptogram and micro-electronic

7、s. Rapid development of modern electronic system integration technology and gradual perfect of crip theory provides strong support to the “birth” of security chip. Under this background, a thought of security key chip based on USB interface technology is brought up in this essay to meet the requirem

8、ent of information safety. Following advanced design method and tools of SOC, design, prototype and evaluation of USB security key chip was initialized. Considering the high-speed circulation of current information, a hard ware-encrypt method based on USB technology was proposed to solve this proble

9、m.Main research and outcome of this essay was described briefly as follows.USB Security Key basic knowledge was described and explained sysmetically,its function and characteristics was analyzed. It was pointed out that the combinationof USB technology and cryptogram technology was an important solu

10、tion to current security problem. The model of USB Security Key was developed, and each part of the model was studied and analyzed. A conclusion was drawn that the most important thing in designing USB Security Key was the establishment of cryptogram protocol and the selection of cryptogram method.A

11、nalysis and research was done on the current mainstream cryptosystem, whichincludes public-key cryptosystem and private-key cryptosystem, and a comparison was made too. Research and comparison on RSA that is the representative public-key cryptosystem and DES that is the representative private-key cr

12、yptosystem were done, and then 3DES was brought up. With the analysis on RSA security, the construction of safe prime number was proposed. Hybrid cryptosystem based on RSA and DES was constructed through combining both traits of the public-key cryptosystem and the private-key cryptosystem. The techn

13、ology of VLSI was implemented while analyzing USB Security Key. From the functional angle, the USB Security Key is divided into two modules that are the USB controller and the cryptogram coprocessor. Utilizing the from-bottom-to-top design method of SOC and the tool of EDA, the chip of USB Security

14、Key was designed. Hybrid criptosystem suitable for SOC was studied, its safety basis, feasibility on chip and advantage was also analyzed, as well as many problems related to the application of hybrid criptosystem in chips. Such as, selection of RSA criptokey length. At the same time, in practical a

15、pplication, not only safety but also aspects of decreasing calculation complexity, improving addition, decoding speed was considered so as to realize in chips, cut cost and easily promote. Protocol of digital signature and authentication based on USB security chip key was furtherbrought up. It provi

16、des valuable information to research and development of cript security specialized chip both in theory and practical application.In practical application, RSA algorithm that has important position in hybrid criptosystem has problem of complicated calculation and slow operation. At present, in home and abroad, most of resarch of realization of RSA algorithm is performed on high speed computer, serial processing method is mostly adopted f

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 行业资料 > 其它行业文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号