Supercharge Your Innovation With Domain-Expert AI Agents!

FPGA-based hard disk encryption and decryption system

A hard disk encryption and hard disk technology, applied in the electronic field, can solve the problems of complex peripheral circuits, key generation methods and authentication methods with low security, and achieve the effect of simplifying peripheral circuits and reducing volume

Active Publication Date: 2014-11-19
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to propose a hard disk encryption and decryption system based on FPGA to solve the technical problems of complex peripheral circuits and low security of key generation and authentication methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • FPGA-based hard disk encryption and decryption system
  • FPGA-based hard disk encryption and decryption system
  • FPGA-based hard disk encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Such as figure 1 with 2 Shown, a kind of hard disk encryption system based on FPGA, is used for encrypting the data that obtains from host computer (computer), and the data after encrypting is stored in hard disk, comprises FPGA and authentication input module, and FPGA comprises processor, key Decryption circuit and data encryption circuit. The key decryption circuit and data encryption circuit are described by IP core or HDL hardware programming language; the FPGA-based hard disk encryption system can also include a read-only memory ROM for storing data or algorithms related to system work. The processor can be a high-performance ARM processor. The main responsibilities of the ARM processor are two: one is to play a master role, coordinate the work of the entire system, and make the system perform at its maximum performance; the other is to use it for system certification.

[0071] The authentication input module is used to receive the user's input authentication; ...

Embodiment 2

[0099] With the rapid development of technology in the information age and the rapid update of electronic products, encryption and decryption algorithms, fingerprint recognition and other software need to be constantly updated to meet new needs and challenges, so as to obtain the highest security, so the encryption and decryption system also needs to be updated in real time. The system also includes a system update module, which is also integrated in the FPGA chip 103 for implementation. The latest firmware can be updated through the system update module without replacing the entire hardware system, which greatly saves costs. In one embodiment of the present invention, the system update module adopts the USB interface 202, and the USB interface 202 is used for firmware update of the whole system. This interface also does not need a dedicated USB interface chip, there are abundant logic resources in the FPGA, and the application of HDL hardware programming language can completel...

Embodiment 3

[0107] The embodiment of the present invention also provides an FPGA-based solid-state disk encryption and decryption method, which is used to encrypt and decrypt the data transmitted between the host and the hard disk. The authentication, data exchange, and encryption and decryption involved in the system are all integrated in one FPGA. It is completed on the chip, and each module is described by IP core or HDL hardware programming language. details as follows:

[0108] S101. Authentication, performing authority authentication on the user, and if the authority authentication is passed, the decryption key is used for encryption and decryption;

[0109] If the authentication is passed, the Encrypted Encryption Key (encrypted key) in the system is decrypted; if the authentication fails, the system cannot work normally. Once the Encrypted Encryption Key is decrypted to Clear Encryption Key (the key in the decrypted state), the key can be used in this system to perform normal enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an FPGA-based encryption and decryption system. The encryption system comprises an FPGA and an authentication input module. The FPGA comprises a processor, a secret key decryption circuit and a data encryption circuit. The authentication input module is used for receiving input authentication of a user. The processor is used for comparing the input authentication with stored setting authentication. If the input authentication is matched with the setting authentication, it is judged that the input authentication passes the authentication; if the input authentication is not matched with the setting authentication, the secret key decryption circuit and the data encryption circuit do not work; the secret key decryption circuit is used for decrypting a stored secret key to obtain a plaintext secret key after the input authentication passes the authentication; the data encryption circuit is used for encrypting data obtained from a computer according to the plaintext secret key after the input authentication passes the authentication, and storing the encrypted data into a hard disk. The FPGA-based encryption and decryption system can improve safety of the hard disk.

Description

technical field [0001] The invention relates to the electronic field, in particular to an FPGA-based hard disk encryption and decryption system. Background technique [0002] With the rapid development of the information industry, hard disks have gradually become the main medium for people to store information due to their large capacity and ease of use. At the same time, it has also brought another major problem-information security. There are two ways to encrypt information, software encryption and hardware encryption. Software encryption consumes CPU and memory, and is slow in speed and low in security; hardware encryption is fast in speed and high in security. [0003] Although the patent CN1924835 adopts the hardware encryption method, the key generation program needs to run on the host computer, and there are still hidden dangers in the software encryption scheme. [0004] Patent CN101281503 provides a complete hardware encryption solution, but its authentication met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/80G06F21/76G06F21/32
CPCG06F21/32G06F21/76G06F21/80
Inventor 马建设张琛程雪岷林家用
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More