Vladimir O. Kuz'menko
Vladimir O. Kuz'menko

Faculty: Computing engineering and science
Sub-faculty: Electronic computing machines
Speciality: Computer systems and networks
Group: CS-07 mag
Master work theme: "Automation of designing high-speed digital devices on FPGA"


Autosynopsis
"Automation of designing high-speed digital devices on FPGA"


1. Introduction. Ground of actuality of theme
Concordantly to information of PricewaterhouseCoopers (PWC), only 22% modern organizations did not feel any incident on informative safety for the last year. In comparsion with 2002 (36%) this number diminished practically in one and a half times. Does it mean, that the number of security incidents has been increased? Probably, does it no. Just now, the company is able to record those cases that had been hidden from their attention previously.
Answering a question, how it is possible to protect information from these misfortunes, from all of modern technologies the most obvious variant – data encryption (picture 1). Really, if encrypt data on a transmitter with one of the modern encryption algorithms with 128-bit key and higher, it is possible to be untroubled for safety of information on this transmitter in case if a transmitter gets in a malefactor hands.

Picture 1. Measures to protect information in the modern organizations, according to the PwC(Animation, 80 shots, 9,12 Kbyte)


Today, as encryption devices most widely use three types of encoder: software, hardware and software and hardware. Their fundamental difference is not only in the method of encryption realization and degree of reliability of data protection but also in a price, that often becomes a determinative for users. As a rule, the most inexpensive solution - software, followed by software and hardware and, finally, the most expensive - hardware. But while the cost of hardware encoder significantly higher software, it almost always pays through a higher quality of information protection, incomparable to the difference in price.
Actuality of dissertation work theme is caused by need modern information protection markets in hardware complexes with low cost.


2. The purposes and tasks of job
A purpose of work is implementation of block encryption algorithms in a base of VLSI FPGA type.
Tasks of work:

  • FPGA implementation of algorithms.
  • speed-optimization of encryption.

  • 3. Prospective scientific novelty and practical value
    The peculiarity of the Master's work is in the using of principles of the parallel and conveyer data processing during optimization of the encipherement algorithms.
    The practical value of work is in that algorithms realization can be successful use in the different telecommunication systems and in storage and data transmission devices. The results can also be used in the educational process in the study subjects of digital systems and protect information.


    4. A review of existing research and development on the topic
    4.1 Local review

    The problem of information security DonNTU involved in the department: computers , radio engineering and Information protection. Be familiar with the work of the department of computer graduates, on the topic, can be in the directory of links. The questions of information protection are engaged byIvanov A. U and Krasichkov A.A.
    4.2 National review
    Development of information protection domain in CIS countries regulated by the legislation, , this special service Communication at the Federal Security Service Russian Federation, State Department special communications and information protection of Ukraine and relevant services of other countries. But despite the fact that the initiative crypto - studies of the state, CIS market represents firms providing

  • software development of information security for IBM-compatible computers;
  • development of cryptographic protection of information resources;
  • design and manufacture of computers, printers, monitors, with protection against interception of information;
  • system integration of protection information means in the information systems of any complexity;
  • consulting and design in creating secure computer systems and telecommunications networks.

  • 4.3 World review
    Unlike the CIS, in the world community at the state monopoly crypto - studies are not so great and there are many organizations working in this field:
  • International Association for Cryptologic Research ( IACR)
  • Technical University of Denmark Department of Mathematics
  • KRyptoGate (Korean cRYPTOgraphers' GATEway)
  • Information Security Group, Royal Holloway, University of London
  • Centre for Computer Security Research, University of Wollongong, NSW, Australia
  • Information Security and Telecommunications Laboratory, Pohang, Korea
  • UCL Crypto Group
  • Center for Cryptography Computer and Network Security (University of Wisconsin, Milwaukee)
  • Cambridge University Computer Security Group
  • Information & Communications Security Laboratory, Sung Kyun Kwan University, Korea
  • Bull SC&T Cryptography Research Group

  • 5. Conclusions
    Now the following jobs has been carried out:

  • analysis of the subject matter in the world;
  • analysis of encryption block algorithms;
  • implementation DES algorithm in the form of VHDL-programm;
  • begun seeking of algorithms speed optimize ways.
  • In future it is planned to conduct algorithms optimization on speed of enciphering. It is planned to conduct an analysis and comparison parameters of received FPGA - implementations.


    6. Literature

  • Шнайер Б. «Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си» – М.: Издательство «ТРИУМФ», 2003 – 816 с.: ил.
  • Мао В. «Современная криптография: теория и практика» - М.: Издательский дом «Вильямс», 2005 - 768 с.: ил.
  • ДонНТУ 2008 © Кузьменко Владимир