Dissertations / Theses on the topic 'FPGA Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 45 dissertations / theses for your research on the topic 'FPGA Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Denning, Daniel. "Encryption systems for FPGA computing." Thesis, University of Glasgow, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438606.
Full textSampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.
Full textKRISHNAN, AKHIL. "HARDWARE IMPLEMENTATION OF A NOVEL ENCRYPTION ALGORITHM." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1139462392.
Full textSvensson, Christian. "High-Speed Storage Encryption over Fibre Channel." Thesis, Linköpings universitet, Datorteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-97043.
Full textVan, Dyken Jason Daniel. "Schemes to reduce power in FPGA implementations of the advanced encryption standard." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/J_Van_Dyken_111307.pdf.
Full textMcDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.
Full textMaster of Science
Graf, Jonathan. "A Key Management Architecture for Securing Off-Chip Data Transfers on an FPGA." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/34063.
Full textMaster of Science
Joshi, Yogesh. "Hardware encryption of AES algorithm on Android platform." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342731146.
Full textHuang, Jian Li Hao. "FPGA implementations of elliptic curve cryptography and Tate pairing over binary field." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.
Full textAbraham, Arya. "It is I: An Authentication System for a Reconfigurable Radio." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34353.
Full textMaster of Science
Novotňák, Jiří. "Hardwarová akcelerace šifrování síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237117.
Full textVetter, Jeff S., and Travis Cribbet. "THE DESIGN AND DEVELOPMENT OF THE PROTOTYPE ENHANCED FLIGHT TERMINATION SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605564.
Full textRange Safety Systems are used for destruction of a vehicle should a malfunction cause the vehicle to veer off course. All vehicles launched into space require implementation of a Range Safety System. For years the IRIG receivers have been used with relatively good success. Unfortunately, the IRIG receivers do not provide a high level of security. High alphabet receivers were later developed for use on the big launchers (Atlas, Delta, Titan, etc) and the manned missions (Shuttle) to provide added security. With the IRIG based system, several problems have occurred resulting in the loss millions of dollars worth of equipment. Due to the problems that have occurred it has become apparent that there is a need for a more secure, low cost, type of range safety receiver. This paper describes the design and development of the prototype EFTS system. Mission critical parameters are discussed including selection of the encryption and forward error correction algorithms. Actual measured performance including message error rate characteristic is presented.
Bengtz, Gustaf. "Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA." Thesis, Linköpings universitet, Institutionen för systemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-111112.
Full textAdamo, Oluwayomi Bamidele. "VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5393/.
Full textHuang, Jian. "FPGA Implementations of Elliptic Curve Cryptography and Tate Pairing over Binary Field." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc3963/.
Full textLien, E.-Jen. "EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN RECONFIGURABLE HARDWARE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=case1333761904.
Full textKožený, Petr. "Implementace šifrovacích algoritmů v jazyku VHDL." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235444.
Full textCherif, Zouha. "Modelling and characterization of physically unclonable functions." Thesis, Saint-Etienne, 2014. http://www.theses.fr/2014STET4005/document.
Full textPhysically Unclonable Functions, or PUFs, are innovative technologies devoted to solve some security and identification issues. Similarly to a human fingerprint, PUFs allows to identify uniquely electronic devices as they produce an instance-specific signature. Applications as authentication or key generation can take advantage of this embedded function. The main property that we try to obtain from a PUF is the generation of a unique response that varies randomly from one physical device to another without allowing its prediction. Another important property of these PUF is to always reproduce the same response for the same input challenge even in a changing environment. Moreover, the PUF system should be secure against attacks that could reveal its response. In this thesis, we are interested in silicon PUF which take advantage of inherent process variations during the manufacturing of CMOS integrated circuits. We present several PUF constructions, discuss their properties and the implementation techniques to use them in security applications. We first present two novel PUF structures. The first one, called “Loop PUF” is a delay based PUF which relies on the comparison of delay measurements of identical serial delay chains. The major contribution brought by the use of this structure is its implementation simplicity on both ASIC and FPGA platforms, and its flexibility as it can be used for reliable authentication or key generation. The second proposed structure is a ring-oscillator based PUF cells “TERO PUF”. It exploits the oscillatory metastability of cross-coupled elements, and can also be used as True Random Number Generator (TRNG). More precisely, the PUF response takes advantage from the introduced oscillatory metastability of an SR flip-flop when the S and R inputs are connected to the same input signal. Experimental results show the high performance of these two proposed PUF structures. Second, in order to fairly compare the quality of different delay based PUFs, we propose a specific characterization method. It is based on statistical measurements on basic delay elements. The main benefit of this method is that it allows the designer to be sure that the PUF will meet the expected performances before its implementation and fabrication. Finally, Based on the unclonability and unpredictability properties of the PUFs, we present new techniques to perform “loop PUF” authentication and cryptographic key generation. Theoretical and experimental results show the efficiency of the introduced techniques in terms of complexity and reliability
Ramsey, Glenn. "Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /." Online version of thesis, 2008. http://hdl.handle.net/1850/7765.
Full textMoussa, Ali Abdellatif Karim. "Chiffrement authentifié sur FPGAs de la partie reconfigurable à la partie static." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066660/document.
Full textCommunication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesis is devoted to efficient and high-speed FPGA-based architectures of AE algorithms, AES-GCM and AEGIS-128, in order to be used in the reconfigurable part of FPGAs to support security services of communication systems. Our focus on the state of the art leads to the introduction of high-speed architectures for slow changing keys applications like Virtual Private Networks (VPNs). Furthermore, we present an efficient method for implementing the GF($2^{128}$) multiplier, which is responsible for the authentication task in AES-GCM, to support high-speed applications. Additionally, an efficient AEGIS-128is also implemented using only five AES rounds. Our hardware implementations were evaluated using Virtex-5 and Virtex-4 FPGAs. The performance of the presented architectures (Thr./Slices) outperforms the previously reported ones.The second part of the thesis presents techniques for low cost solutions in order to secure the reconfiguration of FPGAs. We present different ranges of low cost implementations of AES-GCM, AES-CCM, and AEGIS-128, which are used in the static part of the FPGA in order to decrypt and authenticate the FPGA bitstream. Presented ASIC architectures were evaluated using 90 and 65 nm technologies and they present better performance compared to the previous work
Smékal, David. "Zabezpečení vysokorychlostních komunikačních systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220420.
Full textWang, Chin-Yuan, and 王群元. "FPGA Implementation of Chaos Algorithm for Image Encryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/14013934425841318521.
Full text國立成功大學
工程科學系碩博士班
95
A FPGA-based image capture system with chaotic encryption is developed in this thesis. The immediate image is captured via the COMS sensor, and then encrypted and decrypted by FPGA module. The Logistic map is employed as the encryption algorithm, which designed by the IEEE 754 floating point module to improve the accuracy of the result. For testing the feasibility of this system, the solutions of encryption and decryption are presented and valided on PC. It has been shown that this system can work effectively for image encryption and decryption operations.
Chen-yu-ta and 陳育達. "The FPGA Application Of Encryption Using Hex Hyperchaotic." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65107127765022762018.
Full text明新科技大學
電子工程研究所
97
In this paper, we use the characteristics of Chaos to encrypt/decrypt data transfer in cyberspace since there are a lot of studies and applications on cryptography by Hyperchaotic theories recently. We realize the algorithm for encrypting/decrypting the files and data transferring by a Altra EP2C5 FPGA (Field Programmable Gate Array). The FPGA can be programmed by Verilog and easy to be modified. Encrypting/Decrypting by hardware, in contrast with software, is not easy copied and can achieve the requests for keeping secrecy. This paper can be divide into three parts, and they are the Altra FPGA(EP2C5), the OTI 6889 MCU(the micro controller) and the chatting rooms in cyberspace(Sever, Cline). Also, BCB(BorlandC++) is used to create the functions for chatting and transferring files on internet. In this thesis, all transferring in cyberspace, including the strings and the files, are encrypted and decrypted by the FPGA for maintaining secrecy.
GAO, ZHI-MING, and 高志名. "Design FPGA Prototype for Video Encryption and Decryption." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/42443168945074536984.
Full text中華科技大學
電子工程研究所碩士班
101
With the development of video camera technology, the portable video camera such as digital cameras, car camera recorders, smart phones are widely used. Nowadays, with video camera lens continuous progress, electronic products have multi-media video functions such that we can share images more conveniently. ”Every Solution Breeds the New Problems.” With that powerful device, the information security and personal privacy are becoming the huge problems that we should handle. Therefore, the real time image protection is very important. In this thesis, a video image development platform based on real time image protection is studied. The real time image uses encryption and decryption algorithm and mode structure to perform the image data security protection. The traditional security protection is by software. its complication of security level demand and encryption and decryption algorithm adds much load to the processor and it will reduce the efficiency of the processor. In addition, the software encryption or decryption has the security risk, it is easier to be attacked. Therefore, this study uses FPGA hardware chip to achieve the encryption and decryption algorithm and also combine the webcam as the hardware protection. Other than the upgrade of hardware security, it also integrates the video system as a platform. The hardware chip can perform AES cipher and 4 types of operation mode (ECB、CBC、CFB、OFB) and also hybrid mode. It can achieve the video data security protection. Furthermore, this study presents a defect of the ECB mode structure to bring up hybrid operation mode of ECB+CBC, also to improve weakness of the ECB mode structure. Besides, with hardware mode structure for the whole security protection, and provided for studying the design of video image development platform. Keywords: FPGA Prototype, Advanced Encryption Standard (AES), Video Security
Ni, Wan-Sheng, and 倪萬昇. "AN EFFICIENT FPGA IMPLEMENTATION FOR ADVANCED ENCRYPTION STANDARD ALGORITHM." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/24889035951953243806.
Full text大同大學
電機工程研究所
91
This thesis intends to derive a high speed and low-area architecture to implement AES algorithm. Reprogrammable devices such as Field Programmable Gate Arrays are highly attractive options for hardware implementations of encryption algorithm. We propose a sequential design which achieves the requirements of low area and high data rate in CLB-based FPGA. We present a method to integrate the AES encrypter and the AES decrypter into a full functional AES coengine. We also devised a pipeline design that unroll the 10 AES rounds and pipeline them in order to optimized the frequency and throughput results. The proposed architecture is suited for hardware-critical applications such as smart card, PDA, and mobile phone, etc.
Wang, Ting-Fu, and 王廷富. "An Efficient FPGA Implementation of Advanced Encryption Standard Chip." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/62239123014484495728.
Full text大同大學
通訊工程研究所
97
In this thesis, we propose an efficient Field Programmable Gate Arrays (FPGA) to implement Advanced Encryption Standard (AES) algorithm. The proposed design is based on the pipelined architecture that unrolls the 10 AES rounds to ensure the higher throughput, easer hardware architecture and optimized frequency. This implementation includes encryptor and decryptor which fit the most embedded applications, such as wireless devices, smart card and so on. We use Verilog, Xilinx ISE and ModelSim simulator to implement the chip design.
HUANG, SIH-JIE, and 黃思傑. "Design and Analysis of FPGA-Base Chaotic Encryption System." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/u6w593.
Full text國立臺灣科技大學
自動化及控制研究所
105
In the thesis scheme, we design a three-dimensional chaotic system and prove thebehavior of chaos by phase portraits and Lyapunov exponent. And, the continuous-time chaoticsystem is transformed into discrete-time chaotic system by Euler’ method. Finally, the discretetimechaotic system is implemented phase portraits on the oscilloscope via Altera FPGA DE2-115. A cryptographic system for RGB image security for threedimensional chaotic system is proposed. There are three features in our encryption system. First, we use the information of plaintext image to produce the initial conditions of chaotic system. Second, the image permutation process shuffles the position of pixels in the plaintext image among RGB channels individually. Third, in the diffusion process, the pixels information in the shuffled image are concealed by the XOR operation. And, we implemented the three-dimensional chaotic encryption system via Altera FPGA DE2-115. We can get the cipher image through the FPGA and simulate the image by matlab. In the security analysis such as histogram analysis, correlation coefficient analysis, information entropy analysis, differential attack analysis (NPCR, UACI) are performed. Results of various security analysis confirm that the proposed three-dimensional has high security and it is suitable for practical RGB image encryption.
Lu, Han-Ting, and 呂漢廷. "3D-bitwise Image Encryption Scheme’s Improvement and its FPGA Implementation." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/a2s6b4.
Full text國立臺灣科技大學
自動化及控制研究所
106
In this thesis, we improved a bitwise-based image encryption algorithm and implemented a encryption and transmission system with Altera FPGA DE2-115, and optimized it through FPGA's pipeline feature. We use a three-dimension chaotic system to generate the keys needed for the encryption process. There are two features in our encryption algorithm. First, we proposed an algorithm to improve the existing permutation algorithm to make it more in common use. Second, we optimize the XOR methods used in ordinary encryption algorithms. Use FPGA to design the corresponding circuit, through the highly parallelized and pipelined feature of FPGA, It can improve the efficiency of the algorithm a lot. In the analysis of cryptographic security. We used histogram analysis, correlation coefficient analysis, entropy analysis, and variance analysis, Besides, we also introduced local entropy analysis to verify the effectiveness of our encryption algorithm. Through we proposed an implementation method of the local entropy algorithm. From the above analysis, we can know that the image encryption algorithm we designed is not only highly versatile, but also has the advantages of high performance, and is very suitable for application in realistic systems.
Groth, Toke Herholdt. "FPGA Optimization of Advanced Encryption Standard Algorithm for Biometric Images." Thesis, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-55427.
Full textValiderat; 20140619 (global_studentproject_submitter)
Liang, Shih-Chieh, and 梁仕杰. "Realization of Encryption Algorithms for Bluetooth and WLAN-Using FPGA." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/63781847713180557367.
Full text國立中正大學
電機工程研究所
91
With the rapid growth of the wireless communications, security becomes as an important issue. Data encryption is one of the essential technologies when implementing the security. Bluetooth defines its encryption algorithm for data protection in its specification. WLAN (Wireless Local Area Network) will replace WEP (Wire Equivalent Privacy) encryption algorithm with AES (Advanced Encryption Standard) to become a new data encryption algorithm. In this thesis, we implement Bluetooth and WLAN encryption algorithms via the Xilinx FPGA (Field Programmable Gate Array) board. The design entry of the FPGA uses VHDL (Very High Speed Integrated Circuit Hardware Description Language) because of its flexibility and portability. As a result, we could optimize our designs according to different environment variables and satisfy the demands in reality.
Wu, Hou-Cheng, and 吳厚呈. "Implementation of Encryption Algorithm and Wireless Image Transmission System on FPGA." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/gv64y7.
Full text國立臺灣科技大學
自動化及控制研究所
106
This thesis proposes an encryption algorithm. The key of the algorithm is generated based on the chaotic system. To this end, we designed a four-dimensional chaotic system and discussed the differences caused by compiling the chaotic system in different programming languages. Then we verified the characteristics of the chaotic system with phase portraits and Lyapunov exponent. After verification, we use the Euler's method to obtain the discrete-time signals of the chaotic system. The key generator generates two key sequences according to the discrete-time signal of the chaotic system and the characteristic value of the plaintext file. These key sequences are respectively used in XOR operation and Bits Insertion operation in the encryption algorithm to encrypt the plaintext file. Next, we implement the encryption algorithm and wireless image transmission system to the FPGA-based SOPC system. The hardware used is a pair of Altera DE2-115 motherboard and RFS daughter card. Here, we optimize the key generator and implemented it as an independent circuit. The independent circuit transmits the key to the SOPC system through the parallel I/O port. In SOPC system we designed two modes: Send Mode, Receive Mode. In Send Mode, system read the image file from the SD Card on the motherboard, and then call the encryption algorithm to encrypt the image file. After the image is encrypted, the system write the ciphertext into the SD Card on the mother board, and then the ciphertext is transmitted to the specified IP Port through the daughter card. In Receive Mode, system receive the ciphertext from the specified IP Port through the daughter card, and then call the encryption algorithm to decrypt the ciphertext. After the ciphertext is decrypted, the system write the plaintext to the SD card on the motherboard. In addition, after the system reads in, receives images, and encrypts and decrypts files, the processed data is instantly displayed via the VGA port. Finally, we verify the security of the encryption system by performing histogram analysis, correlation analysis, differential attack analysis, and entropy analysis on multiple ciphertexts. And proposes the future improvement direction of SOPC encrypted transmission system based on FPGA in this thesis.
Barakat, Mohamed L. "Hardware Realization of Chaos Based Symmetric Image Encryption." Thesis, 2012. http://hdl.handle.net/10754/234953.
Full textChien, Yu-Sheng, and 簡育勝. "FPGA Implementation and Design of A hybrid Chaos-AES Color Image Encryption Algorithm." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/fwgz2v.
Full text國立臺灣科技大學
自動化及控制研究所
107
In this thesis, we design an image encryption algorithm based on four-dimensional chaotic system to generate key and improve advanced encryption standard, and implement the encryption and transmission system with Altera FPGA DE10-Standard. The encryption algorithm is optimized by using the pipeline and parallel computing features of FPGA. First, the phase portraits analysis, equilibrium point analysis and Lyapunov exponent are used to verify the characteristics of the chaotic system. The verified chaotic system is used as a key generator for the encryption algorithm. In the improved advanced encryption standard, ShiftRows and SubByres are modified with Spin-Sort and Cubic S-Box, and the round of encryption is reduced. Next, we implement the encryption algorithm and the wired image transmission system to the ARM-based SoC-FPGA. The HPS software runs on Linux and is used to control the FPGA encryption algorithm and image transmission. After complete image encryption, use Socket to transmit to the receive side. Then decrypt the image and display it instantly through the VGA port. In the analysis of cryptographic security, we perform histogram analysis, correlation coefficient analysis, difference analysis and entropy analysis. The entropy analysis includes global and local. The results from the encryption security analysis show that the proposed image encryption algorithm is safe and effective.
Hammad, Issam. "Efficient Hardware Implementations For The Advanced Encryption Standard Algorithm." 2010. http://hdl.handle.net/10222/13110.
Full textLee, Jian-De, and 李建德. "Chaos Synchronization of New Shimizu–Morioka System and Implementation on Image Encryption via FPGA." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/93917278119731491039.
Full text國立臺灣科技大學
自動化及控制研究所
104
The new Shimizu–Morioka chaotic system is presented in this study. We use techniques include phase portraits, divergence computing, power spectrum analysis, equilibrium point analysis and Lyapunov exponent to analysis and understanding of the dynamical behaviors of the chaotic system. Furthermore, we simulate the real circuit and chaos synchronization of numerical analysis. In control theory, we utilize backstepping control, adaptive control, GYC partial region stability theory and BGYC synchronization control to make a slave system be synchronized with the new Shimizu–Morioka chaotic system. After validating the proposed model and controller, the chaotic synchronization and encryption are implemented with FPGA board. We implement the chaotic signal circuits by using FPGA board and implement these chaotic signals for image secure encryption algorithm. In addition, we successfully utilize the synchronization of the coupled control with the new Shimizu–Morioka system for the image encryption algorithm on FPGA. We change the master chaotic system to digital signals and use them to encrypt the image and use the digital signals of the synchronized slave system to decrypt the image in this study.
Sun, Guo Jhih, and 孫國智. "The Design and Implementation of an Improved Twofish Encryption/Decryption Chip Using FPGA Devices." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/00479625818433359228.
Full text國立臺北大學
通訊工程研究所
94
In the recent years, the Internet becomes so popular in the world such that the required bandwidth is growing rapidly and the encryption/decryption of digital data becomes very important. In 1997, NIST (National Institution of Standard and Technology) announced the AES (Advanced Encryption Standard) program to replace DES (Data encryption Standard), and Twofish is one of five schemes that meet the design criteria for AES and an improved Twofish cryptosystem algorithm with much higher security is proposed recently. In this thesis, we would like to realize this Improved Twofish encryption/ decryption chip with an FPGA (Field Programmable Gate Array) Stratix EP1S80 DSP manufactured by Altera Co. since Twofish has the smallest area with hardware implementation. Sixteen Rijndael-like S-boxes were generated mathematically, then we add a pseudo random number generator to determine the S-box should be applied in each round. This can enhance the security to against attacks. The method in our design is hierarchical bottom-up, and the chip performs data encryption, decryption, pseudo random number generation, and key generation in a single hardware unit. The Improved Twofish was implemented by using Verilog HDL (Hardware Design Language) simulation with ModelSim, and compiled with FPGA Compile II. The design of our chip requires 13813 logic elements and its average baud rate can reach 100.16 Mbps under a 31.3 MHz clock.
Grabowski, James Steven. "An FPGA implementation of the advanced encryption standard with support for counter and feedback modes." Thesis, 2007. http://spectrum.library.concordia.ca/975562/1/MR34745.pdf.
Full textWang, Yi-Yuan, and 王億源. "Integrated Design and Realization of WEP、Triple-DES and AES Encryption/Decryption Algorithm - Using FPGA." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/29647469065444316594.
Full text國立中正大學
通訊工程研究所
92
With the rapid growth of wireless communication, security has become an important issue. Data encryption is one of the essential technologies that is used for implementing security. Although the Data Encryption Standard (DES) is widely used for information security, it does not make information secure enough at present. In addition, wired Equivalent Privacy (WEP) is used for authentication and data privacy in popular Wireless Local Area Network (WLAN). However, it is also susceptible to security attacks [1][2]. The Triple Data Encryption Standard (Triple-DES) and the Advanced Encryption Standard (AES) have been adopted by the National Institute of Standards and Technology (NIST) as the new data encryption/decryption standards. In this thesis, we integrate Wired Equivalent Privacy (WEP), Triple Data Encryption Standard (Triple-DES) and Advance Encryption Standard (AES) algorithms in a Xilinx Field Programmable Gate Array (FPGA) board to form a single chip solution for triple-mode encryption/decryption algorithms. In addition, in the design flow, we use the internal memory blocks of the Virtex-II chip in the sub-module architecture to effectively reduce the required gate count.
Chang, Teng-Chieh, and 張登傑. "Control and Synchronization of New LC Chaotic System and its Image Encryption via FPGA Implementation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/44311680436615115432.
Full text國立臺灣科技大學
自動化及控制研究所
103
The new LC chaotic system is presented in this study by adding a feedback control to smooth quadratic autonomous chaotic system which is discovered. We also discuss the dynamical behaviors of the new LC chaotic system by applying various techniques. These techniques include phase portraits, divergence computing, power spectrum analysis, bifurcation diagrams and Lyapunov exponent diagrams. In the part of control theory, by applying GYC partial region stability theory, active pinning control synchronization and reduce pinning controller factor of chaotic system is accomplished. The synchronization of chaotic system using adaptive complex feedback control in complex networks is proposed. In addition, an Image encryption algorithm on FPGA using the new LC chaotic system is achieved. We also discuss histogram analysis, information entropy analysis and differential attack analysis in this study.
Lee, Chi-Feng, and 李其峰. "Control and Synchronization of New Genesio Chaotic System and its FPGA Implementation on Image Encryption." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/41802294665393492288.
Full text國立臺灣科技大學
自動化及控制研究所
103
The chaotic system is proposed in this study by adding a feedback control to the Genesio chaotic system. We discuss the dynamical behaviors of the new Genesio chaotic system by applying various techniques. These techniques include phase portraits, equilibrium point analysis, divergence computing, power spectrum analysis, bifurcation diagrams and Lyapunov exponent diagrams. We also generate the chaotic signals of the new Genesio system on realized circuit board. In control theory, we utilize the adaptive control, the sliding mode control to complete synchronization. We also control the new Genesio chaotic system by the adaptive sliding mode control. Besides, we also use unidirectional and mutual control to make a slave system be synchronized with the new Genesio system. We implement the chaotic signal circuits by using FPGA board and implement these chaotic signals for image secure encryption algorithm. In addition, we successfully utilize the synchronization of the coupled control with the new Genesio system for the image encryption algorithm on FPGA. We change the maser chaotic system to digital signals and use them to encrypt the image and use the digital signals of the synchronized slave system to decrypt the image in this study.
"Implementation of an FPGA based accelerator for virtual private networks." 2002. http://library.cuhk.edu.hk/record=b5895989.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2002.
Includes bibliographical references (leaves 65-70).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Aims --- p.2
Chapter 1.3 --- Contributions --- p.3
Chapter 1.4 --- Thesis Outline --- p.3
Chapter 2 --- Virtual Private Network and FreeS/WAN --- p.4
Chapter 2.1 --- Introduction --- p.4
Chapter 2.2 --- Internet Protocol Security (IPSec) --- p.4
Chapter 2.3 --- Secure Virtual Private Network --- p.6
Chapter 2.4 --- LibDES --- p.9
Chapter 2.5 --- FreeS/WAN --- p.9
Chapter 2.6 --- Commercial VPN solutions --- p.9
Chapter 2.7 --- Summary --- p.11
Chapter 3 --- Cryptography and Field-Programmable Gate Arrays (FPGAs) --- p.12
Chapter 3.1 --- Introduction --- p.12
Chapter 3.2 --- The Data Encryption Standard Algorithm (DES) --- p.12
Chapter 3.2.1 --- The Triple-DES Algorithm (3DES) --- p.14
Chapter 3.2.2 --- Previous work on DES and Triple-DES --- p.16
Chapter 3.3 --- The IDEA Algorithm --- p.17
Chapter 3.3.1 --- Multiplication Modulo 2n + 1 --- p.20
Chapter 3.3.2 --- Previous work on IDEA --- p.21
Chapter 3.4 --- Block Cipher Modes of operation --- p.23
Chapter 3.4.1 --- Electronic Code Book (ECB) mode --- p.23
Chapter 3.4.2 --- Cipher-block Chaining (CBC) mode --- p.25
Chapter 3.5 --- Field-Programmable Gate Arrays --- p.27
Chapter 3.5.1 --- Xilinx Virtex-E´ёØ FPGA --- p.27
Chapter 3.6 --- Pilchard --- p.30
Chapter 3.6.1 --- Memory Cache Control Mode --- p.31
Chapter 3.7 --- Electronic Design Automation Tools --- p.32
Chapter 3.8 --- Summary --- p.33
Chapter 4 --- Implementation
Chapter 4.1 --- Introduction --- p.36
Chapter 4.1.1 --- Hardware Platform --- p.36
Chapter 4.1.2 --- Reconfigurable Hardware Computing Environment --- p.36
Chapter 4.1.3 --- Pilchard Software --- p.38
Chapter 4.2 --- DES in ECB mode --- p.39
Chapter 4.2.1 --- Hardware --- p.39
Chapter 4.2.2 --- Software Interface --- p.40
Chapter 4.3 --- DES in CBC mode --- p.42
Chapter 4.3.1 --- Hardware --- p.42
Chapter 4.3.2 --- Software Interface --- p.42
Chapter 4.4 --- Triple-DES in CBC mode --- p.45
Chapter 4.4.1 --- Hardware --- p.45
Chapter 4.4.2 --- Software Interface --- p.45
Chapter 4.5 --- IDEA in ECB mode --- p.48
Chapter 4.5.1 --- Multiplication Modulo 216 + 1 --- p.48
Chapter 4.5.2 --- Hardware --- p.48
Chapter 4.5.3 --- Software Interface --- p.50
Chapter 4.6 --- Triple-DES accelerator in LibDES --- p.51
Chapter 4.7 --- Triple-DES accelerator in FreeS/WAN --- p.52
Chapter 4.8 --- IDEA accelerator in FreeS/WAN --- p.53
Chapter 4.9 --- Summary --- p.54
Chapter 5 --- Results --- p.55
Chapter 5.1 --- Introduction --- p.55
Chapter 5.2 --- Benchmarking environment --- p.55
Chapter 5.3 --- Performance of Triple-DES and IDEA accelerator --- p.56
Chapter 5.3.1 --- Performance of Triple-DES core --- p.55
Chapter 5.3.2 --- Performance of IDEA core --- p.58
Chapter 5.4 --- Benchmark of FreeSAVAN --- p.59
Chapter 5.4.1 --- Triple-DES --- p.59
Chapter 5.4.2 --- IDEA --- p.60
Chapter 5.5 --- Summary --- p.61
Chapter 6 --- Conclusion --- p.62
Chapter 6.1 --- Future development --- p.63
Bibliography --- p.65
Chang, Yi-Chung, and 張逸仲. "Development of Image Encryption and Decryption Processor by Using Chaotic Signal and Its FPGA Experimental Verification." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/zr7rj7.
Full text國立臺灣科技大學
自動化及控制研究所
105
With the rapid development of information technology, portable data storage devices, Internet and cloud services have become a part of human daily life. For the digitization of personal information, information security has become a significant issue, in which data encryption is one of the popular research object. In this study, a parallel port transmission technique based on four-dimensional chaotic system is proposed for the security of hardware communication. Applying the Matlab to analyze the new 4D chaotic system’s properties which include 2D phase portraits, symmetry and invariance, divergence analysis, equilibrium analysis and Lyapunov exponent diagrams. First, through the two-dimensional phase portraits, divergence analysis, equilibrium analysis and Lyapunov exponent diagram, the new four-dimensional chaotic system is simulated and confirmed that its chaotic properties can be used to generate chaotic sequences through the Euler’s method as the shuffle sequence. In cryptography, confusion and diffusion operations are the main methods for designing the encryption algorithm. In this experiment, all the encryption operation is performed by generating chaotic sequence. In the confusion phase, the characteristic of chaotic pseudorandom sequence is used to shuffle the data content by bit-level permutation. Next, the pixel characters are also substituted by using chaotic pseudorandom number in diffusion phase. All the function for cryptosystem is implemented by Altera DE2-115 FPGA which supports the chaotic secure on parallel transmission. In order to analyze the security of proposed encryption algorithm, a BMP color image will be encrypted and accessed through FPGA. Finally, result of the Matlab analysis, we can get the conclusion of the new 4D chaotic system is a high security and simple-design for a cryptosystem.
Πρίφτης, Αθανάσιος. "Διαφορική ανάλυση ισχύος μιας DES υλοποίησης σε FPGA." Thesis, 2006. http://nemertes.lis.upatras.gr/jspui/handle/10889/1428.
Full text-
Kenney, David. "Energy Efficiency Analysis and Implementation of AES on an FPGA." Thesis, 2008. http://hdl.handle.net/10012/4170.
Full textFu, Xiaoquan. "Design and verification of the data encryption standard for ASICS and FPGAS." 2003. http://etd.utk.edu/2003/FuXiaoquan.pdf.
Full textTitle from title page screen (viewed Sept. 24, 2003). Thesis advisor: Donald W. Bouldin. Document formatted into pages (viii, 94 p. : ill. (some col.). Vita. Includes bibliographical references (p. 57-59).