2013级集成电路EDA设计与实践
课程名称: 集成电路EDA设计与实践 学号: 姓名: 指导老师:
2013-12-17至2013-12-29
1
2013级集成电路EDA设计与实践
摘要
密码技术作为信息安全的支撑技术,事关国家的根本利益,同时直接影响国家的未来和发展,世界各国都对此予以充分重视。随着网络的快速发展,信息安全越来越引起人们的关注。
DES(Data Encryption Standard,数据加密标准)加密算法在成为加密标准到今天,经历了长期的考验。实践证明DES算法的安全性是能够满足大部分的安全要求的。
所以,本文主要完成了以下几方面的主要工作:
(1)完成了DES加密系统的整体设计。整个系统包括DES加密核心模块和函数包模块。
(2)在ALTERA公司的Quartus II环境下用VHDL实现,进行编译和仿真。 关键字:DES;VHDL;
2
2013级集成电路EDA设计与实践
Abstract
As the key of the information security,encryption technology influence the nation’s benefit. It will affect national’s future and the development directly. Various countries all regarding this as important technology.With the rapid development of internet, people pay more attention to the information security.
DES (Data Encryption Standard) encryption arithmetic has been standing through many tests since it became the encryption standard. It is proved that the security of the DES encryption can satisfy the voluminous needs.
Therefore, the main contributions of the paper are as follow:
(1)Completed the whole design of the DES encryption system .The whole system includes the DES encryption core module and the function package module.
(2)Used ALTERA Company platform--Quartus II,VHDL to realize design , compile, and simulate the design. Key word:DES,VHDL
3
2013级集成电路EDA设计与实践
目 录
第一章 绪论…...............................................................................5
1.1 DES加密系统的研究背景及意义.................................5 1.2 DES基本概念及特点...........................................5 1.3 DES加密原理.................................................6 1.4 硬件描述语言VHDL简介.......................................7 1.5 Quartus ||开发工具简介......................................8 1.6 本章小结....................................................9
第二章 密钥生成.........................................10
2.1 取得密钥....................................................10 2.2 等分密钥....................................................10 2.3 密钥移位....................................................11 2.4 密钥选取....................................................12 2.5 迭代........................................................13 2.6 本章小结....................................................14
第三章 数据的加密操作...................................15
3.1 取得数据....................................................15 3.2 初始换位....................................................15 3.3 数据扩展....................................................16 3.4 数据压缩..................................................17 3.5 数据换位..................................................23 3.6 交换数据...................................................24 3.7 迭代.......................................................24 3.8 数据整理...................................................24 3.9 本章小结...................................................25
第四章 仿真结果及分析....................................27 第五章 结论....................................................28
4
相关推荐: