Presentation is loading. Please wait.

Presentation is loading. Please wait.

Company LOGO Hashing System based on MD5 Algorithm Characterization Students: Eyal Mendel & Aleks Dyskin Instructor: Evgeny Fiksman High Speed Digital.

Similar presentations


Presentation on theme: "Company LOGO Hashing System based on MD5 Algorithm Characterization Students: Eyal Mendel & Aleks Dyskin Instructor: Evgeny Fiksman High Speed Digital."— Presentation transcript:

1 Company LOGO Hashing System based on MD5 Algorithm Characterization Students: Eyal Mendel & Aleks Dyskin Instructor: Evgeny Fiksman High Speed Digital Systems Laboratory

2 Project Goals 2. Exploring Cryptography/MD5 algorithm 1. Learning development environment 3. Building sample application

3 Introduction The discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification, or prevent its unauthorized use. Our project will deal with the aspect of undetected modification-digital signature. A digital signature is an electronic rather than a written signature that can be used by someone to authenticate the identity of the sender of a message or of the signer of a document. It can also be used to ensure that the original content of the message or document that has been conveyed is unchanged. The discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification, or prevent its unauthorized use. Our project will deal with the aspect of undetected modification-digital signature. A digital signature is an electronic rather than a written signature that can be used by someone to authenticate the identity of the sender of a message or of the signer of a document. It can also be used to ensure that the original content of the message or document that has been conveyed is unchanged. Cryptography and digital signature

4 Introduction-continued A Stream Compiler (ASC) provides an interface for programming (or generating) stream architectures for flexible hardware such as Field Programmable Gate Arrays (FPGA-s). The ASC interface uses the familiar C++ syntax with ASC specific semantics to simplify the task of generating flexible hardware accelerators running in parallel to a microprocessor to speed up software running on the microprocessor. ASC combines ideas from computer science and engineering to create a compiler that generates flexible hardware. A Stream Compiler (ASC) provides an interface for programming (or generating) stream architectures for flexible hardware such as Field Programmable Gate Arrays (FPGA-s). The ASC interface uses the familiar C++ syntax with ASC specific semantics to simplify the task of generating flexible hardware accelerators running in parallel to a microprocessor to speed up software running on the microprocessor. ASC combines ideas from computer science and engineering to create a compiler that generates flexible hardware. ASC – brief acquaintance

5 Project Inputs-Outputs MD5 Module Data for Signature Digital signature

6 Test Environment Block Diagram Power PC MD5 module PLB BUS PLB contains 32 bits for address and 64 bits for data transferring. The frequency of Power PC processor is 450MHz. PLB clock 100-125MHz

7 Project Schedule Middle presentation. Getting started. EDK, Embedded stand alone. 4 weeks Getting started with ASC 1 week Investigating MD5. Code research 2 weeks Implementation Design 1 week Schedule

8 THE END THANK YOU FOR YOUR TIME.


Download ppt "Company LOGO Hashing System based on MD5 Algorithm Characterization Students: Eyal Mendel & Aleks Dyskin Instructor: Evgeny Fiksman High Speed Digital."

Similar presentations


Ads by Google