Font Size: a A A

The Cryptology Algorithm In The Model Of The Secure Electronic Transaction

Posted on:2005-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChiFull Text:PDF
GTID:2168360122988185Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
There will bring certain of negative influence to the development of the electronic commerce, because of the insecurity of the information delivery on the internet. Therefore, the problem of the secure electronic transaction has been paid to more and more attention. This article will discuss the application research of the cryptology algorithm in the model of the secure electronic transaction based on the analysis of the model of the secure electronic transaction.Aimed at the complexity of the cryptology algorithm, this article discuss the management using the public key cryptology and the private key cryptology distribution, use the private key cryptology encrypt and decrypt the information which to be delivered. This program ensure the information rate and the security. Synthesizing the current cryptology technique, this article use the safety DES and AES which has been international accepted as the private key cryptology, use RSA as the public key cryptology.The realization of the RSA public key cryptology algorithm will has some difficulties, because of the high complexity. Therefore the calculate process has been improved. For the module index calculation. The "square multiply" algorithm has been highly improved compared with the "module multiply" algorithm. The "square multiply" has been widely used in the RSA algorithm. This article discuss another algorithm which has been improved---SMM(Symmetry of Modulo Multiplacation) algorithm. Its principle based on the symmetry of the square surplus and the arithmetical compliment of the multiply. In the plain of the aspect examine: will proceed the base that plain examine to use fix for(2,3,5,7)and made 24 as index number at the same time. According to the test, it's time almost reduced one-third for the movement.
Keywords/Search Tags:SET, the model of secure electronic transaction, RSA, DES, AES
PDF Full Text Request
Related items