Professional Documents
Culture Documents
Chapter No
Chapter No
CHAPTER NO
TITLE ABSTRACT LIST OF TABLES LIST OF FIGURES INTRODUTION 1.1 Overview of the project 1.1.1 Symmetric key encryption technique 1.1.2 Asymmetric key encryption technique 1.1.3 Cryptographic hash function 1.1.4 Applications of cryptographic hash functions 1.2 Network- On- Chip 1.2.1 Benefits of Network-On-Chip 1.3 Introduction to VLSI systems 1.4 Cryptographic Processor 1.4.1 Need for the cryptographic processors 1.5 Statement of work 1.5.1 Existing system 1.5.2 Drawbacks of the existing system 1.5.3 Proposed system 1.5.4 Advantages of proposed system v
9 10
LITERATURE SURVEY 2.1 Introduction 2.2 Survey DESIGNING 3.1 Overall architecture 3.2 RSA algorithm 3.3 Current hash functions background 3.4 BLAKE hash functions 3.4.1 Message padding 3.4.2 Counter 3.4.3 State initialization 3.4.4 State update 3.4.5 G-function 3.4.6 Finalization 3.5 VHDL implementation 3.5.1 VHDL language 3.5.2 Design units 3.6 Software tool 3.6.1 Modelsim RESULTS CONCLUSION REFERENCES vi
11 11 11 18 18 20 25 26 29 30 31 32 33 36 38 38 38 39 39 42 48 49
4 5
LIST OF TABLES
TITLE RSA algorithm method public and private key pairs Permutation table (rc) Blake constants Finalization Blakes Initialization Vector
PAGE NO 23 35 36 37 37
vii
LIST OF FIGURES FIGURE NO 1.1 1.2 1.3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 4.1 4.2 4.3 4.4 TITLE Symmetric Key Encryption Technique Asymmetric Key Encryption Technique Functional flow diagram of existing system Block diagram of the cryptographic processor Proposed architecture for more secured reconfigurable cryptographic processor Example for RSA Algorithm
Top level diagram of Blake State initialization
PAGE NO 2 3 8 18 19 25 27 32 33 34 40 41 42 43 44 46
Basic steps for simulating a design in ModelSim Modelsim software Prime no generation in RSA Encryption and Decryption process in RSA Blake encryption Blake decryption
viii