Contents & References of Investigating the optimal algorithms of robust cryptography for implementation on FPGA
List:
Dedicated to:
Holy presence of the rest of God Almighty, Imam of Time, Ruhi Leh Al-Fida
Dedicated to:
My dear wife and child who sacrificed their peace for my peace
Thank you and Acknowledgment
Here, I consider it necessary to express my gratitude to my honorable teacher, Mrs. Dr. Rahbeh Niarki. Like a caring sister, she gave me special favor and guidance during my studies and on the way to my dissertation. I am also grateful for the valuable advice of Dr. Siavash Aminnejad.
Affidavit of originality of the thesis or thesis
I am Bahram Sharifi Marjqal, a graduate of the continuous master's degree in electrical and electronics engineering, who on 6/24/93 from his thesis entitled "Investigation of optimal algorithms for robust encryption for implementation on FPGA" with a score of 17 and grade. I have defended and hereby undertake: 1) This thesis is the result of research and research conducted by me, and in cases where I have used the scientific and research achievements of others (such as theses, books, articles, etc.), according to the existing procedures, I have mentioned and included the name of the source used and its other details in the relevant list. Universities and institutions of higher education are not provided.
3) If after graduation, I intend to use and exploit this thesis in any way, including publishing books, patenting, etc. I will obtain the relevant permits from the department of research vice-chancellor of the unit.
4) If at any point in time it is proven to be contrary to the above, I accept the consequences and the university unit is allowed to treat me according to the rules and regulations and I will not have any claims in case of the cancellation of my academic degree.
Name and surname: Bahram Sharifi Marjqol
.
Date and Expiration
Table of Contents
Title H
List of figures L
List of tables C
Abstract 1
Chapter 1- An overview of the basic concepts of cryptography. 3
1-1- Introduction 3
1-2- Necessity of network security. 3
1-3- Types of attacks. 3
1-3-1- Changing information 3
1-3-2- Impersonation 4
1-3-3- Eavesdropping 4
1-4- Data encryption 4
1-5- Symmetric data encryption 5
1-6- Asymmetric data encryption 6
1-7- Digital signature. 7
1-8- Abstract generator function. 7
1-9- The general characteristics of abstract generator functions. 7
1-10- Classification of abstract generator functions. 8
1-11- Features of abstract generator functions. 8
1-12- Classification of abstractor functions in terms of application: 8
1-13- Properties of one-way abstractor functions. 10
1-14- Important abstract generator functions. 11
1-15- hash security or abstract generator function. 12
Chapter 2- Introducing the final algorithm of the competition. 15
Introduction 15
2-1- History 15
2-2- Status of the second round of SHA-3 competition. 16
2-3- Review and evaluation of abstract generator algorithms of the semi-final round of the SHA-3 competition. 17
2-4- Review of the BLAKE abstract generator algorithm. 17
2-4-1- BLAKE features. 18
2-4-2- The structure of the BLAKE generator abstract function. 18
2-4-3- Result: 19
2-5- Review of Skein abstract generator algorithm. 19
2-5-1- Skein features. 20
2-5-2- Structure of abstract generator function. 21
2-5-3- Result. 21
2-6- Review of Keccak abstract maker. 21
2-6-1- Features of Keccak. 22
2-6-2- The structure of the abstract generator function. 23
2-6-3- Result. 25
2-7- Review of the Grostl abstract generator algorithm25
2-7- Review of the Grostl abstract generator algorithm 25
2-7-1- The structure of the abstract generator function. 25
2-7-2- The structure of the Grostl compressor function 25
2-7-3- Result. 28
2-8- Review of JH's abstract generator algorithm. 28
2-8-1- Introduction of JH algorithm. 28
2-8-2- JH compressor function structure. 28
2-8-3- JH security analysis. 29
2-8-4- Advantage JH 30
2-8-5- Result. 30
2-9- Conclusion. 30
2-10- The reasons for choosing the JH algorithm and its evaluation. 31
Chapter 3- JH Algorithm. 33
Introduction 33
3-1- Introduction of JH abstract generator algorithm. 33
3-2- Mathematical symbol and parameters used in JH abstract generator function. 37
3-3- S-box layer JH abstract generator function. 38
3-4- Linear transformation of L layer. 39
3-5- Pd substitution. 40
3-6- Permutation of ??d. 40
3-7- Permutation of P´d. 41
3-8- Permutation. 41
3-9- Pd permutation relation. 41
3-10- Round function Rd. 42
3-11- Grouping. 43
3-12- Grouping and De-grouping to calculate rotation: 43
3-13- Fixed rotation on Ed function. 45
3-14- Structure of Fd compressor function. 45
3-15- Overview of FPGA. 47
3-15-1- Different design methods using FPGA. 49
3-15-2- The different stages of an FPGA project are as follows. 51
3-15-3- A look at the architecture of today's FPGAs. 51
3-15-4- logical cells. 51
3-15-5- Sources of internal connections. 52
3-15-6- Memory resources 52
3-15-7- Conclusion 53
Chapter 4- Simulation and synthesis. 55
Introduction: 55
4-1- The architecture used in the JH simulator. 55
4-1-1- Analyzing the general shape of the main design. 56
4-1-2- Block architecture for 42 rounds. 58
4-1-3- State machine (FINITE STATE MACHINE) 59
4-2- Review of simulation algorithm for JH-224 bit. 61
4-2-1- Block (Data unit) Top module. 61
4-2-2- Control unit circuit block 62
4-2-3- Control circuit 63
4-2-4- State circuit and FSM Controller block 64
4-2-5- Input and output i/o interface. 67
4-2-6- Connection between input and output circuit. 68
4-3- ISE emulator program. 69
4-3-1- Implementation simulator program. 69
Step by step of each block is shown. 69
4-3-2- Simulatior program 72
4-4- Conclusion. 89
Chapter 5 - Conclusion and suggestions 91
References 94
Appendix 1: VHDL codes. 98
Appendix 2: Persian to English dictionary. 127
Appendix 3: English to Persian dictionary. 129
Abstract 130
Source:
References
[1] Zakir al-Hosseini, Ali. 1387. Data security. Tehran: Scientific and Cultural Institute - text
[2] Sheikh Zadegan, Javad. 2019. Introductory cryptology. Tehran: Cultural and Artistic Institute of Signal Processing [3] http://www.isc.org.ir/ShowPage.asp/monadi
[4] The Second Cryptographic Hash Workshop, August 24-25, 2006, Santa Barbara, CA, http://csrc.nist.gov/groups/ST/hash/second_workshop.html
[5] Announcing the Development of New Hash Algorithm(s) for the Revision of Federal Information Processing Standard (FIPS) 180–2, Secure Hash Standard, Federal Register / Vol. 72, No. 14 / Tuesday, January 23, 2007 / Notices 2861, http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Jan07.pdf [6] http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/submissions_rnd2.html
WWW.nist.gov/hash-competition
[7] Bos. J.W., Stefan. D, March 2010, "Performance Analysis of the SHA-3 Candidates on Exotic Multi-Core Architectures", Cryptographic Hardware and Embedded Systems, vol. 6225 of LNCS, pp. 279-293 Springer, www.springerlink.com/content/9p48014n967455r7// http:
[8] Aumasson