目录摘要:.....................................................................................................................................1ABSTRACT................................................................................................................................2第1章绪论.............................................................................................................................31.1研究背景.......................................................................................................................31.2国内外研究状况...............................................................................................................31.2.1古典密码学.................................................................................................................41.2.2现代密码学.................................................................................................................41.2.3总线介绍.....................................................................................................................91.3小结.................................................................................................................................11第2章相关算法的描述.......................................................................................................122.1分组密码.............................................................................................................................122.1.1分组密码的基本原理...............................................................................................122.1.2数据加密标准(DES)................................................................................................132.1.3高级加密标准(AES)................................................................................................192.2HASH函数.........................................................................................................................232.2.1Hash函数的性质.....................................................................................................232.2.2基于分组密码的Hash函数.....................................................................................242.2.3Hash函数MD5........................................................................................................262.2.4SHA-1散列算法......................................................................................................30第3章嵌入式设备身份验证系统的实现方案...................................................................333.1系统架构.............................................................................................................................333.1.1总体设计方案...........................................................................................................333.1.2协议帧及其说明.......................................................................................................343.1.3功能模块图及其说明...............................................................................................343.2开发板介绍和串口通信函数介绍.....................................................................................383.2.1开发板介绍...............................................................................................................383.2.2串口通信API介绍..............