Design of Data Encryption Transmission System Based on FPGA

  • Yan Yu
  • Bingbing Song
  • Xiaozhen Liu
  • Qun Ding
  • Ziheng Yang
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 298)


In this paper, the hardware system of data encryption and security transmission is studied. A kind of encryption nuclear is designed using chaotic sequences and stream cipher. In addition, a scheme of data encryption system based on FPGA is proposed, thus a new type of encryption system is obtained. Meanwhile, the simulation of the key generation circuit is accomplished. The experiment shows that this hardware encryption system can achieve the encryption and decryption. It ensures the secure transmission of data further.


data encryption system FPGA secure transmission 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Huang, Z.E., Yu, S.M., Zhou, W.J.: Chaotic Digital Image Encryption and Its Hardware Implementation based on FPGA Technology. Communication Technology 12, 343–346 (2008)Google Scholar
  2. 2.
    Pu, C.L., Li, W.X., Lin, J.G.: A Kind of Chaotic Synchronization System and Its Application for Secure Communications. Bulletin of Science and Technology 22, 842–845 (2006)Google Scholar
  3. 3.
    Wang, L., Sun, H.J., Zhao, J.: Application of the Data Encryption Technology in the Field of Computer Network Security. Telecom Power Technology 30, 54–57 (2013)Google Scholar
  4. 4.
    Zhang, A.H., Jiang, Z.Q.: Improving for Chaotic Image Encryption Algorithm Based on Logistic Mapping. Nanjing University of Posts and Telecommunications (Natural Science) 29, 69–73 (2009)Google Scholar
  5. 5.
    Fan, J.L., Zhang, X.F.: Piecewise Logistic Chaotic Map and Its Performance Analysis. Acta Electrorica Dinica 37, 720–724 (2009)MathSciNetGoogle Scholar
  6. 6.
    Liu, P., Yan, C., Huang, X.G.: Optimized Method of Generating the Spread-Spectrum Sequences Based on Logistic-Map. Communications 28, 134–138 (2007)Google Scholar
  7. 7.
    Li, L., Han, W.B., Wang, Z.: The Research of Parameters Selection on the Model of Time-Memory-Data Trade-Off Attack to A5/1. Electronics & Information Technology 34, 1911–1915 (2012)CrossRefGoogle Scholar
  8. 8.
    Ding, Q., Peng, X.Y., Yang, Z.H.: The Cipher Chip of Combining Stream Based on the Neural Network Algorithm. Acta Electronica Sinica 34, 409–412 (2006)Google Scholar
  9. 9.
    Guan, C.Y., Gao, F.: An Encryption Algorithm Based on Chaotic Sequences. Beijing Institute of Technology 23, 363–366 (2003)Google Scholar
  10. 10.
    Chen, W., Hu, Y., Yang, Y.X.: Application of Correlation Attack in Algorithm Identify. Electronics & Information Technology 28, 828–831 (2006)Google Scholar
  11. 11.
    Liu, X.Y., Qiu, S.S., Huang, G.Z., Fan, Y.: An Overview of Chaos-based Digital Communication Systems. Telecommunication Engineering, 1–9 (2005)Google Scholar
  12. 12.
    Wu, H., Ding, Q., Zhou, P.: Logistic Chaotic Sequence Design and Application in Data Encryption. Scientific Instrument 30, 372–375 (2009)Google Scholar
  13. 13.
    Chen, W., Yang, Y.X., Niu, X.X.: Improvement of A5/1 Algorithm Against Correlation Attack. Beijing University of Posts and Telecommunication 29, 120–123 (2006)Google Scholar
  14. 14.
    Li, Z.Q., Sun, X.X., Du, C.B.: Hardware Design and Implementation of Wi-Fi Technology Based Encryption Systerm. In: 2013 International Conference on SNS&PCS, vol. 5, pp. 144–147 (2013)Google Scholar
  15. 15.
    Song, J.Y., Mo, X.K., Niu, Q.J.: Design of JTIDS Message Restorer Based on FPGA. Fire Control&Command Control 37, 153–156 (2012)Google Scholar
  16. 16.
    Niu, Q.J., Mo, X.K., Zhao, W.J., Song, J.Y.: Design of JTIDS Transmission Code Generator Based on FPGA. Telecommunication Engineering 50, 43–46 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Yan Yu
    • 1
  • Bingbing Song
    • 1
  • Xiaozhen Liu
    • 1
  • Qun Ding
    • 1
  • Ziheng Yang
    • 1
  1. 1.Electronic Engineering CollegeHeilongjiang UniversityHarbinChina

Personalised recommendations