Implementation method of sm4-gcm network encryption transmission system based on fpga

An encrypted transmission and system implementation technology, applied in the field of FPGA-based SM4-GCM network encryption transmission system implementation, can solve problems such as slowing down encryption/decryption efficiency, slowing down encryption/decryption operation, system performance bottleneck, etc., to achieve stability security and safety, reduce computing time and resource occupation, and avoid the effect of resource occupation and delay

Active Publication Date: 2022-07-26
HANGZHOU DIANZI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional hardware-based key exchange is implemented by asymmetric encryption method. The disadvantage is that the call of this part is not frequent, but it occupies a lot of resources and increases the cost.
And the encryption must wait for the key exchange to be completed. For a system with frequent key changes, the key exchange will undoubtedly greatly slow down the overall encryption / decryption efficiency of the system.
Secondly, due to the calculation method of GMAC, the message authentication part often slows down the operation of encryption / decryption in the environment of network encrypted transmission, which becomes the bottleneck of system performance.
[0005] In view of the key update and message authentication problems in the SM4_GCM method in the encrypted transmission network mentioned above, it is urgent to design an implementation method for improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of sm4-gcm network encryption transmission system based on fpga
  • Implementation method of sm4-gcm network encryption transmission system based on fpga
  • Implementation method of sm4-gcm network encryption transmission system based on fpga

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0034] refer to figure 1 A flow chart of the steps of the implementation method of the FPGA-based SM4-GCM network encrypted transmission system of the present embodiment; figure 2 A schematic diagram of the module relationship of the FPGA-based SM4-GCM network encrypted transmission system according to an embodiment of the present invention; image 3 It is the top-level hardware structure of the FPGA-based SM4-GCM network encrypted transmission system according to an embodiment of the present invention;

[0035] Specifically, a method for implementing an FPGA-based SM4-GCM network encrypted transmission system is characterized in that: comprising the following steps:

[0036] S1, receive the required data from the data preparation module, and send the parameters and keys into the random number module and the key expansion module respectively to generate corresponding random numbers and expansion keys;

[0037] S2, send the random number and plaintext to the encryption modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an FPGA-based SM4-GCM network encryption transmission system implementation method, comprising the following steps: S1, receiving required data from a data preparation module, and sending parameters and keys into a random number module and a key expansion module respectively to generate Corresponding random number and extended key; S2, send the random number and plaintext to the encryption module for encryption; S3, send the obtained ciphertext, key and random number to the message authentication module to generate the HMAC value; S4, add / At the same time of decryption, the system will update the key required for the next time through the SM3 algorithm and the Pascal algorithm; the present invention uses the shake-128 algorithm in Keccak to realize the generation of random numbers, and improves the security of random numbers. And the optimization of message authentication operation improves its resource utilization and working frequency, and is more suitable for high-speed network environment; uses SM3 algorithm and Pascal algorithm to realize the safe change of keys, and combines with GMAC module to ensure the correctness of system key update sex.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to an implementation method of an FPGA-based SM4-GCM network encrypted transmission system. Background technique [0002] In recent years, with the development of 5G network technology, the rate of data transmission on the network has become faster and faster, and the amount of data has become larger and larger; at the same time, the attacks on the data transmission process have become more and more acute. In order to ensure the security of data transmission, data is often encrypted before transmission. However, due to the improvement of network data transmission rate and the upper limit of software encryption itself, the encryption rate requirements cannot be fully satisfied in high-speed networks, so the use of hardware to implement encrypted transmission has become a feasible solution. [0003] In the implementation process, in order to meet the high throughput of n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W12/03
CPCH04L9/0869
Inventor 崔颖超姚英彪周红徐欣姜显扬冯维
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products