Paper
2 November 2023 Design of DMA burst transmission with AES encryption function
Xiyuan Li, Fenfen Wang, Zongguang Yu
Author Affiliations +
Proceedings Volume 12919, International Conference on Electronic Materials and Information Engineering (EMIE 2023); 129191I (2023) https://doi.org/10.1117/12.3011201
Event: 3rd International Conference on Electronic Materials and Information Engineering (EMIE 2023), 2023, Guangzhou,, China
Abstract
DMA transfer copies data from one address space to another, providing high-speed data transfer between peripherals and storage or between storage and storage. The DMA transmission method does not require the CPU to directly control the transmission, saving CPU resources and greatly improving CPU efficiency. With the rapid development of microcontrollers in the field of automotive electronics, microcontrollers that meet the requirements of automotive regulations should have high reliability and security. The application of AES encryption function in DMA can effectively improve security. This design is based on the AES encryption function and the DMA controller design for 16byte bursts. Compared to the DES algorithm, it reduces the time loss of 8ns by transmitting data every 10k bytes. AES encryption and decryption functions are added to the DMA transmission. The design for 16byte burst DMA transmission based on AES encryption is developed in Verilog, and the simulation verification is done.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Xiyuan Li, Fenfen Wang, and Zongguang Yu "Design of DMA burst transmission with AES encryption function", Proc. SPIE 12919, International Conference on Electronic Materials and Information Engineering (EMIE 2023), 129191I (2 November 2023); https://doi.org/10.1117/12.3011201
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data transmission

Design and modelling

Computer security

Microcontrollers

Data integration

Clocks

Data processing

Back to Top