[1]邓程方 王铮.基于流加密的CPU私化的研究[J].计算机技术与发展,2011,(05):134-138.
 DENG Cheng-fang,WANG Zheng.Research of Privatization of CPU Based on Stream Cipher[J].,2011,(05):134-138.
点击复制

基于流加密的CPU私化的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年05期
页码:
134-138
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research of Privatization of CPU Based on Stream Cipher
文章编号:
1673-629X(2011)05-0134-05
作者:
邓程方 王铮
重庆大学计算机学院计算机软件与理论系
Author(s):
DENG Cheng-fang WANG Zheng
Dept. of Computer Software and Theory, Institute of Computer, Chongqing University
关键词:
CPU流加密私化MACHash认证
Keywords:
CPU stream cipher privatization MAC Hash authentication
分类号:
TP309.7
文献标志码:
A
摘要:
CPU是计算机的核心部分,它的主要功能就是解释并执行计算机指令以及处理计算机中的数据。运行在计算机中的所有应用程序都是由CPU可以处理的机器指令构成。为了提高计算机的安全性,提出了通过CPU的私化来阻止一些常见的攻击。CPU私化是通过加密指令和数据,使其对外部以密文存在,来达到私化的目的。处于安全性和效率的考虑,所有加密均采用流加密。此外,对数据的认证,保护程序完整性也是防止恶意篡改的有效手段。文中结合加密和认证的方式来实现CPU的私化,提高计算机的安全性
Abstract:
The central processing unit (CPU) is the core portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer' s functions. All programs that is executed by computer consist of the machine code that can be recognized by CPU. In order to enhance the security of computer, proposes a method to deter some common attack through the privatization of CPU. The privatization of CPU is to cipher the instructioin and data, store only encypted data in external memory out of CPU. In consideration of security and performence, uses stream cipher for encryption. Moreover, also proposes the authentication of data to deter the malicious tamper of adversary, and provide the protection of integerity of programs. Make a research on the privatization of CPU through encyption and authention, and enhance the security of computer

相似文献/References:

[1]王本有 苏守宝 汪德如.一种基于FPGA的CPU设计[J].计算机技术与发展,2008,(06):221.
 WANG Ben-you,SU Shou-bao,WANG De-ru.CPU Design Based on FPGA[J].,2008,(05):221.
[2]时继曦 沈苏彬.视频流安全传送系统的设计与实现[J].计算机技术与发展,2010,(10):154.
 SHI Ji-xi,SHEN Su-bin.Design and Implementation of a Secure Transfering System for Video-Streaming[J].,2010,(05):154.
[3]程茹洁,陆 建,蒋厚明,等.智能移动终端的能耗模型研究[J].计算机技术与发展,2017,27(12):128.[doi:10.3969/ j. issn.1673-629X.2017.12.028]
 CHENG Ru-jie,LU Jian,JIANG Hou-ming,et al.Research on Energy Consumption Model on Smartphones[J].,2017,27(05):128.[doi:10.3969/ j. issn.1673-629X.2017.12.028]

备注/Memo

备注/Memo:
邓程方(1985-),男,硕士研究生,研究方向为分布式实时嵌入系统;王铮,硕士,副教授,研究方向为网络安全、嵌入式实时操作系统
更新日期/Last Update: 1900-01-01