1 / 12

Encryption / Decryption VHDL Core Project Characterization

Technion - Israel institute of technology department of Electrical Engineering . הטכניון - מכון טכנולוגי לישראל הפקולטה להנדסת חשמל. Encryption / Decryption VHDL Core Project Characterization . Instructor : Mony Orbach Semester : Winter-Spring 2013

favian
Download Presentation

Encryption / Decryption VHDL Core Project Characterization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technion - Israel institute of technology department of Electrical Engineering הטכניון - מכון טכנולוגי לישראלהפקולטה להנדסת חשמל Encryption / Decryption VHDL CoreProject Characterization Instructor : MonyOrbach Semester : Winter-Spring 2013 Performed By: Watad Duna, Watad Esam

  2. Introduction • We are interesting to send a message From A to B • Transferring messages done by a unsecured channel • Encryption can provide a means of securing information <Message> <Message> !hd#4!xZf Decrypt Encrypt

  3. Symmetric Vs. Asymmetric • Symmetric: • When using symmetric algorithms, both parties share the same key for encryption and decryption • Once somebody else gets to know the key, it is not safe any more • Symmetric algorithms have the advantage of not consuming too much computing • Asymmetric: • Asymmetric algorithms use pairs of keys, one is used for encryption and the other one for decryption • The decryption key is typically kept secretly, therefore called ``private key'' while the encryption key is spread to all who might want to send encrypted messages, therefore called ``public key'‘ • The secret key can't be reconstructed from the public key

  4. RSA Algorithm • The RSA algorithm is named after Ron Rivest, Adi Shamir and Len Adlemanwho invented it in 1977 • It is the most widely-used asymmetric algorithm encryption in the world • It can be used to encrypt a message without the need to exchange a secret key separately • The security of the RSA cryptosystem is based on two mathematical problems • The problem of factoring large numbers • The RSA problem

  5. Project’s Goals • Enhancing encryption and decryption processing time by implementing RSA algorithm by hardware • Achieving reasonable safety level

  6. RSA Theory • Key Generation Algorithm • Generate two large random primes, p and q • Compute n = pq and (phi) φ = (p-1)(q-1) • Choose an integer e, 1<e<phi, such that gcd(e,phi) = 1 • Compute the secret exponent d, 1 < d < phi, such that (e x d) ≡ 1 (mod phi) • The public key is (n, e) and the private key (d, p, q)

  7. RSA Theory (Cont.) • Encryption Sender A does the following: • Obtains the recipient B's public key (n, e) • Represents message as a positive integer m, 1< m< n • Computes c = me mod n • Sends the c to B

  8. RSA Theory (Cont.) • Decryption Recipient B does the following: • Uses his private key (n, d) to compute m = cd mod n • Extracts the message from the representative m

  9. RSA – Very Simple Example • Select primes p=11, q=3 • n = p*q=11*3 = 33 phi=(p-1)(q-1)=10*2=20 • Choose e=3 ( gcd(3, 20) = 1 ) • Compute d such that e*d ≡ 1 (mod phi)simple calculation lead to d=7 • say we want to encrypt the message m = 7c = me mod n = 73 mod 33 = 343 mod 33 = 13 • To decrypt the encryption result we computem' = cd mod n = 137 mod 33 = 7

  10. Work Flow Studying Theory Background Writing a C code illustrate RSA Encryption/Decryption Choosing Work Environment According To Implementation Requirements Simulation/Testing Improving performance Writing VHDL Code Which Implements RSA Synthesis / Validation

  11. TimeLine

  12. ?Questions

More Related