Research of RSA Encryption Technology in FPGA Dynamic Reconfigurable System on Security
|School||Dalian University of Technology|
|Keywords||FPGA Reconfigurable Technology RSA Montgomery algorithm|
Since the emergence of FPGA (Field Programmable Gate Array) in1980s, it has found an increasingly wide utilization in aerospace, defense, automotive, Consumer Electronics, Medical, Communications and so on. With the expansion of FPGA’s application market, the security threats that FPGA face are steadily increasing. So the security design about FPGA has become a research hotspot at home and abroad. In this paper, a safe and feasible method aiming at protecting the FPGA configuration data is proposed that the dynamic self-reconfigurable technology of FPGA combined with the RSA algorithm. Based on the study of dynamic self-reconfigurable technology and RSA algorithm, a remote encrypted dynamic reconfigurable system using ethernet has been designed and implemented.Firstly, the algorithm principle and implementation method of RSA were in depth studied, and the existing RSA algorithm structure was improved and optimized in this paper. Then modified RSA algorithm was implemented in Verilog hardware description language and had a behavioral simulation with ModelSim. With the correct simulation, RSA IP core was completed using Xilinx’s embedded development kit (EDK).Secondly, this paper designed two simple reconfigurable modules on Virtex-5platform, and generated the original configuration data with RSA IP core. The encrypted configuration data was generated on Spartar-3E platform using RSA IP core. The two simple reconfigurable module’s function were not found after Virtex-5platform power up, but initialized with the dynamic reconfigurable data, which were transmitted from PC and decrypted by RSA IP core. When reconfigurable module needs to be updated, it can also use the way mentioned above to update the system.Finally, the system can be debugged and analyzed with the realtime logic analyzer ChipScope. The results proved the feasibility and security of the system. In addition, the test phenomena can obviously prove the accuracy of the system.