FPGA encryption method and device based on MD5 algorithm
A technology of encryption device and encryption method, which is applied in the direction of encryption device with shift register/memory, secure communication device, internal/peripheral computer component protection, etc., to achieve the effect of convenient protection and quick judgment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] A simple example is given here to illustrate the relationship between the initialized data, the four original data and the calculated data. Firstly, the original data is given as 512'h{32'h0,32'h8,416'h0,32'h8061}, and then four original data are given as A=32'h67452301, B=32'hefcdab89, C= 32'h98badcfe and D=32'h10325476. Using formulas (1) (2) (3) (4) and (5) to jointly calculate the final check value of 128'h0CC175B9C0F1B6A831C399E269772661. Use the serial port to send the packet header format and checksum data as shown in the table in appendix b to check whether the FPGA chip selection signal is normally enabled; use the serial port to send the packet header format and other data as shown in the table in appendix b to check whether the FPGA chip selection signal cannot be opened normally .
Embodiment 2
[0058] A simple example is given here to illustrate the relationship between the initialized data, the four original data and the calculated data. Firstly, the original data is 512'h{32'h0, 32'h8, 416'h0, 32'h 8061}, and then the four original data are A=32'h00000618, B=32'hefcdab89, C =32'h98badcfe and D=32'h10325476. Using formulas (1) (2) (3) (4) and (5) to jointly calculate the final check value is 128'hB95480924BD2716EF377DF8350D529B2. Use the serial port to send the packet header format and checksum data as shown in the table in appendix b to check whether the FPGA chip selection signal is normally enabled; use the serial port to send the packet header format and other data as shown in the table in appendix b to check whether the FPGA chip selection signal cannot be opened normally . It can be seen from the comparison between Embodiment 1 and Embodiment 2 that two completely irrelevant checksums can be obtained only by changing A in the four initial data.
[0059] app...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


