Skip to main content

Design of Data Encryption Transmission System Based on FPGA

  • Conference paper
Intelligent Data analysis and its Applications, Volume II

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 298))

  • 1878 Accesses

Abstract

In this paper, the hardware system of data encryption and security transmission is studied. A kind of encryption nuclear is designed using chaotic sequences and stream cipher. In addition, a scheme of data encryption system based on FPGA is proposed, thus a new type of encryption system is obtained. Meanwhile, the simulation of the key generation circuit is accomplished. The experiment shows that this hardware encryption system can achieve the encryption and decryption. It ensures the secure transmission of data further.

This paper is supported by Innovated Team Project of ’Modern Sensing Technology’ in colleges and universities of Heilongjiang Province (No. 2012TD007) and Institutions of Higher Learning by the Specialized Research Fund for the Doctoral Degree (No.20132301110004).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, Z.E., Yu, S.M., Zhou, W.J.: Chaotic Digital Image Encryption and Its Hardware Implementation based on FPGA Technology. Communication Technology 12, 343–346 (2008)

    Google Scholar 

  2. Pu, C.L., Li, W.X., Lin, J.G.: A Kind of Chaotic Synchronization System and Its Application for Secure Communications. Bulletin of Science and Technology 22, 842–845 (2006)

    Google Scholar 

  3. Wang, L., Sun, H.J., Zhao, J.: Application of the Data Encryption Technology in the Field of Computer Network Security. Telecom Power Technology 30, 54–57 (2013)

    Google Scholar 

  4. Zhang, A.H., Jiang, Z.Q.: Improving for Chaotic Image Encryption Algorithm Based on Logistic Mapping. Nanjing University of Posts and Telecommunications (Natural Science) 29, 69–73 (2009)

    Google Scholar 

  5. Fan, J.L., Zhang, X.F.: Piecewise Logistic Chaotic Map and Its Performance Analysis. Acta Electrorica Dinica 37, 720–724 (2009)

    MathSciNet  Google Scholar 

  6. Liu, P., Yan, C., Huang, X.G.: Optimized Method of Generating the Spread-Spectrum Sequences Based on Logistic-Map. Communications 28, 134–138 (2007)

    Google Scholar 

  7. Li, L., Han, W.B., Wang, Z.: The Research of Parameters Selection on the Model of Time-Memory-Data Trade-Off Attack to A5/1. Electronics & Information Technology 34, 1911–1915 (2012)

    Article  Google Scholar 

  8. Ding, Q., Peng, X.Y., Yang, Z.H.: The Cipher Chip of Combining Stream Based on the Neural Network Algorithm. Acta Electronica Sinica 34, 409–412 (2006)

    Google Scholar 

  9. Guan, C.Y., Gao, F.: An Encryption Algorithm Based on Chaotic Sequences. Beijing Institute of Technology 23, 363–366 (2003)

    Google Scholar 

  10. Chen, W., Hu, Y., Yang, Y.X.: Application of Correlation Attack in Algorithm Identify. Electronics & Information Technology 28, 828–831 (2006)

    Google Scholar 

  11. Liu, X.Y., Qiu, S.S., Huang, G.Z., Fan, Y.: An Overview of Chaos-based Digital Communication Systems. Telecommunication Engineering, 1–9 (2005)

    Google Scholar 

  12. Wu, H., Ding, Q., Zhou, P.: Logistic Chaotic Sequence Design and Application in Data Encryption. Scientific Instrument 30, 372–375 (2009)

    Google Scholar 

  13. Chen, W., Yang, Y.X., Niu, X.X.: Improvement of A5/1 Algorithm Against Correlation Attack. Beijing University of Posts and Telecommunication 29, 120–123 (2006)

    Google Scholar 

  14. Li, Z.Q., Sun, X.X., Du, C.B.: Hardware Design and Implementation of Wi-Fi Technology Based Encryption Systerm. In: 2013 International Conference on SNS&PCS, vol. 5, pp. 144–147 (2013)

    Google Scholar 

  15. Song, J.Y., Mo, X.K., Niu, Q.J.: Design of JTIDS Message Restorer Based on FPGA. Fire Control&Command Control 37, 153–156 (2012)

    Google Scholar 

  16. Niu, Q.J., Mo, X.K., Zhao, W.J., Song, J.Y.: Design of JTIDS Transmission Code Generator Based on FPGA. Telecommunication Engineering 50, 43–46 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Yu, Y., Song, B., Liu, X., Ding, Q., Yang, Z. (2014). Design of Data Encryption Transmission System Based on FPGA. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume II. Advances in Intelligent Systems and Computing, vol 298. Springer, Cham. https://doi.org/10.1007/978-3-319-07773-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07773-4_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07772-7

  • Online ISBN: 978-3-319-07773-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics