Implementation method of SM4-GCM network encryption transmission system based on FPGA

An encryption transmission and system implementation technology, applied in the field of FPGA-based SM4-GCM network encryption transmission system implementation, can solve problems such as slowing down encryption/decryption efficiency, system performance bottlenecks, and increasing costs

Active Publication Date: 2021-05-07
HANGZHOU DIANZI UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional hardware-based key exchange is implemented by asymmetric encryption method. The disadvantage is that the call of this part is not frequent, but it occupies a lot of resources and increases the cost.
And the encryption must wait for the key exchange to be completed. For a system with frequent key changes, the key exchange will undoubtedly greatly slow down the overall encryption / decryption efficiency of the system.
Secondly, due to the calculation method of GMAC, the message authentication part often slows down the operation of encryption / decryption in the environment of network encrypted transmission, which becomes the bottleneck of system performance.
[0005] In view of the key update and message authentication problems in the SM4_GCM method in the encrypted transmission network mentioned above, it is urgent to design an implementation method for improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of SM4-GCM network encryption transmission system based on FPGA
  • Implementation method of SM4-GCM network encryption transmission system based on FPGA
  • Implementation method of SM4-GCM network encryption transmission system based on FPGA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0034] refer to figure 1 The FPGA-based SM4-GCM network encrypted transmission system implementation method step flowchart of the present embodiment; figure 2 A schematic diagram of the module relationship of the FPGA-based SM4-GCM network encrypted transmission system of an embodiment of the present invention; image 3 Be the top-level hardware structure of the SM4-GCM network encrypted transmission system based on FPGA of an embodiment of the present invention;

[0035] Specifically, an FPGA-based SM4-GCM network encrypted transmission system implementation method is characterized in that: comprising the following steps:

[0036] S1, receiving the required data from the data preparation module, sending the parameters and keys to the random number module and the key expansion module to generate corresponding random numbers and expansion keys;

[0037] S2, send the random number and plaintext to the encryption module for encryption;

[0038] S3, sending the obtained cipher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SM4-GCM network encryption transmission system implementation method based on an FPGA, and the method comprises the following steps: S1, receiving required data from a data preparation module, and respectively sending a parameter and a secret key into a random number module and a secret key extension module to generate a corresponding random number and an extension secret key; S2, sending the random number and the plaintext into an encryption module for encryption; S3, sending the obtained ciphertext, key and random number to a message authentication module to generate an HMAC value; S4, during encryption / decryption, enabling the system to update a key required for the next time through an SM3 algorithm and a Pascal algorithm. According to the invention, the shake-128 algorithm in the Keccak is utilized to realize the generation of the random number, the security of the random number is improved, and the resource utilization rate and the working frequency of the random number are improved by optimizing the nonlinear transformation operation and the message authentication operation, so the method is more suitable for the environment of a high-speed network; the SM3 algorithm and the Pascal algorithm are utilized to realize the safe change of the secret key, and the GMAC module is combined to ensure the correctness of the system secret key update.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an implementation method of an FPGA-based SM4-GCM network encrypted transmission system. Background technique [0002] In recent years, with the development of 5G network technology, the rate of network transmission data has become faster and faster, and the amount of data has become larger and larger; at the same time, the attacks on the data transmission process have become more and more acute. In order to ensure the security of data transmission, data is often encrypted before transmission. However, due to the improvement of network data transmission rate and the upper limit of software encryption itself, the encryption rate requirements cannot be fully met in high-speed networks, so using hardware to implement encrypted transmission has become a feasible solution. [0003] In the implementation process, in order to meet the high throughput of network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04W12/03
CPCH04L9/0869
Inventor 崔颖超姚英彪周红徐欣姜显扬冯维
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products