基于SHA-256算法的嵌入式软件保护技术研究
发布时间:2018-03-22 07:41
本文选题:嵌入式 切入点:SHA-256 出处:《华东师范大学》2014年硕士论文 论文类型:学位论文
【摘要】:随着嵌入式产品在人们日常生活中的不断普及、嵌入式行业的不断开放,嵌入式软件的知识产权保护问题逐渐凸显。软件克隆、逆向工程等不仅给各大厂商造成了巨大的经济损失,还阻碍了整个嵌入式行业的健康发展。没有人希望投入了高额研发成本的产品一推向市场便被竞争对手从硬件到软件原封不动地克隆。在硬件技术逐渐公开和成熟的今天,如何用低廉的成本和高效的方法来保护嵌入式软件的知识产权成为了该领域一个迫切需要解决的问题。针对目前大多数厂商使用的纯软件加密方案的不可靠、纯硬件加密方案的高成本的现状,本文实现了一种软硬件结合的认证保护嵌入式软件的方案。本文首先研究了常见Hash函数的原理和安全性,将SHA-256算法在资源有限的ARM Cortex-M微控制器上实现,在软件层面上对算法进行一些优化,然后配合价格低廉的加密芯片ATSHA204,设计了合理、高效的认证流程,并将该方案实现。最终系统的功能测试和性能测试,验证了方案的正确性和可靠性。该软件保护方案达到了资源占用少、成本低廉、实现方便、即使固件被克隆也不能正常工作的效果,也为今后嵌入式软件保护技术的研究提供了良好的理论和实际依据。
[Abstract]:With the popularization of embedded products in people's daily life and the opening of embedded industry, the intellectual property protection of embedded software becomes more and more important. Reverse engineering has not only caused huge economic losses to major manufacturers, It also hinders the healthy development of the entire embedded industry. No one hopes that products with high R & D costs will be cloned by competitors from hardware to software as soon as they reach the market. How to protect the intellectual property of embedded software with low cost and high efficiency has become an urgent problem in this field. Due to the high cost of pure hardware encryption scheme, this paper implements a scheme of authentication and protection embedded software combining hardware and software. Firstly, the principle and security of common Hash function are studied in this paper. The SHA-256 algorithm is implemented on the ARM Cortex-M microcontroller with limited resources, and the algorithm is optimized at the software level. Then, with the low-cost encryption chip ATSHA204, a reasonable and efficient authentication process is designed. Finally, the function test and performance test of the system verify the correctness and reliability of the scheme. The software protection scheme has the advantages of less resource consumption, low cost and convenient implementation. Even if the firmware is cloned, it can not work properly, which provides a good theoretical and practical basis for the future research of embedded software protection technology.
【学位授予单位】:华东师范大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP311.53
【参考文献】
相关期刊论文 前3条
1 李顺东,覃征,王向华;一种新的报文摘要(MDC)生成算法[J];计算机研究与发展;2003年03期
2 肖皇培;张国基;;基于Hash函数的报文鉴别方法[J];计算机工程;2007年06期
3 杨智勇;;嵌入式系统的软件保护方案[J];计算机应用与软件;2009年08期
相关博士学位论文 前2条
1 鲁晓成;嵌入式软件保护关键技术研究与应用[D];武汉理工大学;2011年
2 张绍兰;几类密码Hash函数的设计和安全性分析[D];北京邮电大学;2011年
,本文编号:1647709
本文链接:https://www.wllwen.com/falvlunwen/zhishichanquanfa/1647709.html