基于SHA-256算法的嵌入式軟件保護(hù)技術(shù)研究
發(fā)布時(shí)間:2018-03-22 07:41
本文選題:嵌入式 切入點(diǎn):SHA-256 出處:《華東師范大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:隨著嵌入式產(chǎn)品在人們?nèi)粘I钪械牟粩嗥占、嵌入式行業(yè)的不斷開(kāi)放,嵌入式軟件的知識(shí)產(chǎn)權(quán)保護(hù)問(wèn)題逐漸凸顯。軟件克隆、逆向工程等不僅給各大廠商造成了巨大的經(jīng)濟(jì)損失,還阻礙了整個(gè)嵌入式行業(yè)的健康發(fā)展。沒(méi)有人希望投入了高額研發(fā)成本的產(chǎn)品一推向市場(chǎng)便被競(jìng)爭(zhēng)對(duì)手從硬件到軟件原封不動(dòng)地克隆。在硬件技術(shù)逐漸公開(kāi)和成熟的今天,如何用低廉的成本和高效的方法來(lái)保護(hù)嵌入式軟件的知識(shí)產(chǎn)權(quán)成為了該領(lǐng)域一個(gè)迫切需要解決的問(wèn)題。針對(duì)目前大多數(shù)廠商使用的純軟件加密方案的不可靠、純硬件加密方案的高成本的現(xiàn)狀,本文實(shí)現(xiàn)了一種軟硬件結(jié)合的認(rèn)證保護(hù)嵌入式軟件的方案。本文首先研究了常見(jiàn)Hash函數(shù)的原理和安全性,將SHA-256算法在資源有限的ARM Cortex-M微控制器上實(shí)現(xiàn),在軟件層面上對(duì)算法進(jìn)行一些優(yōu)化,然后配合價(jià)格低廉的加密芯片ATSHA204,設(shè)計(jì)了合理、高效的認(rèn)證流程,并將該方案實(shí)現(xiàn)。最終系統(tǒng)的功能測(cè)試和性能測(cè)試,驗(yàn)證了方案的正確性和可靠性。該軟件保護(hù)方案達(dá)到了資源占用少、成本低廉、實(shí)現(xiàn)方便、即使固件被克隆也不能正常工作的效果,也為今后嵌入式軟件保護(hù)技術(shù)的研究提供了良好的理論和實(shí)際依據(jù)。
[Abstract]:With the popularization of embedded products in people's daily life and the opening of embedded industry, the intellectual property protection of embedded software becomes more and more important. Reverse engineering has not only caused huge economic losses to major manufacturers, It also hinders the healthy development of the entire embedded industry. No one hopes that products with high R & D costs will be cloned by competitors from hardware to software as soon as they reach the market. How to protect the intellectual property of embedded software with low cost and high efficiency has become an urgent problem in this field. Due to the high cost of pure hardware encryption scheme, this paper implements a scheme of authentication and protection embedded software combining hardware and software. Firstly, the principle and security of common Hash function are studied in this paper. The SHA-256 algorithm is implemented on the ARM Cortex-M microcontroller with limited resources, and the algorithm is optimized at the software level. Then, with the low-cost encryption chip ATSHA204, a reasonable and efficient authentication process is designed. Finally, the function test and performance test of the system verify the correctness and reliability of the scheme. The software protection scheme has the advantages of less resource consumption, low cost and convenient implementation. Even if the firmware is cloned, it can not work properly, which provides a good theoretical and practical basis for the future research of embedded software protection technology.
【學(xué)位授予單位】:華東師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP311.53
【參考文獻(xiàn)】
相關(guān)期刊論文 前3條
1 李順東,覃征,王向華;一種新的報(bào)文摘要(MDC)生成算法[J];計(jì)算機(jī)研究與發(fā)展;2003年03期
2 肖皇培;張國(guó)基;;基于Hash函數(shù)的報(bào)文鑒別方法[J];計(jì)算機(jī)工程;2007年06期
3 楊智勇;;嵌入式系統(tǒng)的軟件保護(hù)方案[J];計(jì)算機(jī)應(yīng)用與軟件;2009年08期
相關(guān)博士學(xué)位論文 前2條
1 魯曉成;嵌入式軟件保護(hù)關(guān)鍵技術(shù)研究與應(yīng)用[D];武漢理工大學(xué);2011年
2 張紹蘭;幾類密碼Hash函數(shù)的設(shè)計(jì)和安全性分析[D];北京郵電大學(xué);2011年
,本文編號(hào):1647709
本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/1647709.html
最近更新
教材專著