چكيده به لاتين
Abstract:
Information has a special place in the need to provide security for important and secret cryptographic algorithms. Important security can be ensured that will inevitably be exchanged in insecure environments or information stored. The term cryptography is a "system" with a "mathematical/logical" pattern, based on which information and concepts that are understandable to everyone, according to the return procedure, become incomprehensible and vague information. Choosing the correct algorithm for data encryption is the most critical factor in creating system security. In cryptographic algorithms, it must always be considered that the privacy of an algorithm is an advantage for that algorithm. Only from the point of view of mathematical theory for which an algorithm is produced and by which it is powerful is that algorithm better known and well documented because it is well studied and tested and even endangered. Are. Therefore, in this research, the Raijudael AES algorithm has been studied because it has been well tested, studied and implemented by prominent authorities since its invention. In 2001, the Rytdel encryption algorithm was selected as an alternative encryption algorithm following the NIST call 2001 to find a standard algorithm. Software implementations always have to limit factors that prevent high speeds. These are the types of implementations that are why, for more than ten years, most cryptographic engineering studies have focused on hardware cryptographic optimizations to achieve this. Consumption of hardware is also a significant factor in achieving cost efficiency and reducing consumption. To achieve this goal, many solutions have been provided to design cryptographic resources. These solutions at the highest levels of abstraction to decision on the platform Construction and space design direction Implement cryptographic resources. In order to implement the algorithms in the hard drive, designers have proposed including the use of versatile processors (GPPs), design on FPGA rebuildable hardware, and design using integrated ASIC circuits. All-purpose processors are not suitable for high-performance applications due to the execution of commands and fixed and limited bandwidth. At the same time, hardware such as ASIC and FPGA does not have such limitations. Designers can use ASIC technology to increase efficiency, achieve maximum throughput, reduce power consumption and reduce hardness resources.
It should be noted that the best performance can be achieved using this technology, but this method is higher for limited applications and has no economic justification. This method also requires careful management of hardware resources such as bandwidth selection, constants, and memory size. The design is a hardwired structure in this method and can be changed and updated. So, the best options ahead are to use FPGA reconfigurable hardware. Although the final system speed implemented on FPGA is usually slower than ASIC, it is faster than the software system or software implemented on all processors. Considering the mentioned points and the pattern of using hardware, the primary purpose of this research is to provide a solution for searching the design space and examining the types of design and synthesis, such as speed and consumption of hardware resources in hardware implementation. AES encryption algorithm is based on FPGA. The combination of pipeline methods and resources in different parts of data encryption operations reduces the length of critical paths to achieve these goals. It reduces the impact of paths from input to output, thus achieving the highest speed and minimum resources. Be. will be. Also, optimization of different stages of encryption, especially the byte patrol stage, is implemented by implementing this section as a hybrid circuit instead of using the search table to categorize the least consumed hardware resources. It must always be used carefully registers to break the critical path and increase the consumption of hardware resources. Therefore, in different applications, the system designer must always balance the two factors of throughput and consumption of hardware resources, depending on the type of application. At the end of this section, it should be noted that examples of cryptographic hardware and IPCore encryption cores suitable for being placed on FPGA are produced and available by foreign companies. However, because the discussion is about information security and always data Important are encrypted, the sample of foreign products in this field cannot be trusted. Also, the price of foreign products is very high. Because of this, internal implementations of cryptographic algorithms in both hardware and software platforms are vital.