期刊文献+

兼容安全的一体化数据链收发信机设计

Design of Compatible and Secure Integrated Data Link Transceiver
在线阅读 下载PDF
导出
摘要 针对现有数据链功能军民兼容性不强、通信与保密相对独立等问题,设计了一款兼容安全的一体化数据链收发信机。该系统选用国产元器件实现核心数字处理组件、信道组件、功放组件和电源组件等设计,以Mini PCIe保密安全模块为可信根节点,信任链从安全模块根节点传递到数据链软件,实现可信安全防护,同时通过可信中间件提供了数据链通信体制的其他密码和安全计算服务。该系统通过实际工程验证,能够满足军民数据链通信需求,降低数据链系统安全风险。 Aiming at the problems of weak civil military compatibility and relatively independent communication and confidentiality of existing data link functions, a compatible and secure integrated data link transceiver is designed. The system uses domestic components to realize the core design of digital processing module,channel module, power amplifier module and power supply module. Taking the security module of MiniPCIe as the trusted root node, the trust chain is transferred from the root node of the security module to the data link software to realize the trusted security protection. At the same time, other password and security computing services of the data link communication system are provided through the trusted middleware. Through practical engineering verification, the system can meet the requirements of civil military data link integration communication and reduce the security risk of data link system.
作者 高宗伟 Gao Zong-wei(Southwest China Institute of Electronic Technology,Sichuan Chendu 610036)
出处 《电子质量》 2021年第6期49-52,共4页 Electronics Quality
关键词 数据链 收发信机 可信安全防护 一体化 Data link Transceiver Trusted security protection Integrated
  • 相关文献

参考文献3

二级参考文献34

  • 1容晓峰,苏锐丹,刘平,周利华.高性能密码服务器的并行数据处理[J].系统工程与电子技术,2005,27(6):1115-1119. 被引量:3
  • 2肖政,韩英,叶蓬,侯紫峰.基于可信计算平台的体系结构研究与应用[J].计算机应用,2006,26(8):1807-1809. 被引量:23
  • 3Thompson Herbert H.Why Security Testing Is Hard[J].IEEE Security & Privacy,2003,1(4):83.
  • 4Amold T W,Doom L P Van.The PCIXCC:A New Cryptographic Coprocessor for the IBM eServer[J].IBM Journal of Research and Development,2004,48(3/4):475.
  • 5Smith S W,Weingart S H.Building a High Performance,Programmable Secure Coprocessors[J].Computer Networks:Special Issue on Computer Network Security,1999,31:831.
  • 6Lin A,Brown R.The Application of Security Policy to Role-based Access Control and the Common Data Security Architecture[J].Computer Communications,2000,23(17):1584.
  • 7Jolyon Clulow.On the Security of PKCS #11[C] //Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2003),Germany:Springer-verlag Press,2003:411.
  • 8Peter Gutmann.Cryptographic Security Architecture:Design and Verification[M].New York:Springer-verlag,2002.
  • 9Wu L,Weaver C,Austin T.CryptoManiac:A Fast Flexible Architecture for Secure Communication[C] //Proceedings of the 28th International Symposium on Computer Architecture (ISCA 2001).Sweden:IEEE CS Press,2001:110.
  • 10Yee B S.Using Secure Coprocessors[R].CMU-CS-94-149.Carnegie Mellon University,1994.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部