Font Size: a A A

Based On Elliptic Cryptosystem, Digital Signature System

Posted on:2002-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:M Q ZhangFull Text:PDF
GTID:2208360095960981Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In now days, domestic defensive ability of information and network is extremely fragile. So it is of great practical significance in the field of information security to investigate and design a digital signature and encryption system with independent property right. This project is a subsystem of the project "digital signature and authentication system", which is a project in national 863 scheme. In this paper, the conventional crypt system and public key crypt system are analyzed, especially the security property of RSA public key algorithm which is widely used at present The merit of elliptic curve public key crypt system (ECC) is expounded. A digital signature algorithm based on ECC is constructed. In addition, a set of digital signature and encrypt system is designed using Borland C++ Builder developmental flat roof. The main content of the paper is as follows:The fast implementation of big integer operation. In this theme, class BIG is defined in order to express and operate big integers. So it is convenient to program. The existing comparatively mature algorithms about these two problems is optimized and improved. Fast implementation of operation on big integers is realized mainly through cut buffer, namely the strategy of getting time by space.Implementation of combined public key system. In this theme, combined public key system composed by ECDH key exchanging algorithm and block crypt system is introduced. Files are encrypted by block cipher and keys used in encrypting are exchanged by ECDH system. Thus two problems are solved, one is the inconvenience on encryption and decryption brought by the difficulty of key distribution in conventional crypt systems, the other is the slow rate of encryption and decryption in common public key systems.Structure of cryptogram is deeply investigated in this theme. A efficient structure of beginning of cryptogram is prescribed. Program implementation algorithm based on this cryptogram structure is designed as well, compatibility and unification of diversified cryptogram forms in the system is realized. Meanwhile, ideas in research toward standardization of cryptogram form is provided to information security researching staff of inland and overseas.Digital signature and verification are the guarantee of data integrity and authenticity of user identity. In this theme, a secure and feasible elliptic curve digital signature and authentication algorithm is designed. The algorithm has been realized on computers, and is approved to have steady capability.Design and realize of digital signature algorithm based on elliptic curve crypt system. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. Data integrality and user authenticity is ensured.A set of digital signature and encrypt software based on elliptic curve crypt system is designed in this theme. Which is the newest elliptic curve crypt applied product that have been opened. The blank in applied software development of elliptic curve crypt inland is filled up. The system adopt multi-player and distributed manage pattern in structure, maintainable and stability is improved. Through testing on the running efficiency of the software, and comparing it to the world famous software PGP we get the result that this software has obvious advantage in encryption, decryption, digital signature and signature verification.
Keywords/Search Tags:encryption, decryption, public key crypt system, elliptic curve crypt system (ECC), digital signature, verification
PDF Full Text Request
Related items