Font Size: a A A

The Engineering Implementation And Application Research Of Fast RSA And AES Algorithm

Posted on:2003-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y GaoFull Text:PDF
GTID:2168360065457084Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The modern society is a information society. With the rapid development of the Internet, the whole world was tied more and more tightly. This has brought human being society great convenience, at the same time, also brought a series of serious problems in which the information security is the most outstanding one. Because there are many sensitive and important data on the internet, the information security has been paid to more and more attention. To ensure the security of information, the general way is through building the regulations of information government and the methods of cryptology.Cryptology is the core of the information security. Modern cryptograph divides into the public key system and the private key system. The private key system is also called the single key system, its encryption process is the same as its decryption process. The public key system is also called the double key system, its encryption process is different with its decryption process. Because the public key system can publish its public key and only keep its private key secret , it has many new functions such as the digital signature and authentication, which is widely used in every area of the society.Though the public key algorithm has great advance, its running speed can not compare with the private key system for it is based on a complicated trapped function. In the actual application, the general way is to use the public-key algorithm transmitting the key of the private key system and the private key algorithm transmitting the cipher text. This way can ensure the security.This article will introduces the representative of the public key system and the private key system-RSA and AES algorithm. The RSA algorithm is a widely used algorithm while the AES algorithm being the substitute of the DES, is regard as the encryption standard of the 21st century. It has great actual significance to make research on such two algorithms. This article will finish a secure and authenticable key exchange on the base of the two algorithms.The first chapter is the exordium. This article introduces some concepts concerning information security in the second chapter; introduces knowledge about cryptology in the third chapter; introduces the AES algorithm in the 4th chapter; the 5th chapter is the introduce and analysis to the RSA algorithm; the 6th chapter introduce the improvement of the RSA algorithm including the big_number restore and operation and the improvement algorithm of the "squaremultiply" algorithm. In the last chapter, the key exchange is introduced.Though this article makes much improvement to the RSA algorithm, there is still many no perfect place and need to improve later. The key exchange algorithms need connect with the CA institution because the communication sides need the public key each other, this confines the application of this algorithm. So there is a big room to improve for this article.
Keywords/Search Tags:RSA, AES, key exchange
PDF Full Text Request
Related items