Font Size: a A A

Research And Application Of Identity Authentication System Based On Elliptic Curve In Wireless Environment

Posted on:2006-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:H Y HuangFull Text:PDF
GTID:2168360155458184Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Authentication technology is an important aspect of the information security theory and technology, and the identity authentication is the first barrier of security system, therefore it is of vital importance in security system, particularly in the area of e-commerce which requires higher security. At present, all of electronic commerce activities on the internet employ the certificate-based public key cryptosystem to solve their related security issues. However, due to the noticeable difference between wireless environment and conventional lineate environment, for instance, the relatively narrow network bandwidth, the greater transmission delay time, the unstable network, the lower memory capacity and electronic power, etc. As a result many security system in lineate environment are not suitable for wireless environment, it is very essential to develop a kind of identity authentication system suit for wireless environment.Firstly we introduce elliptic curve cryptosystem closely related to the thesis, then make a detailed analysis concerning algorithms and protocols about identity authentication and application in wireless environment, finally develop a self-certified identity authentication system based on elliptic curve over finite field F2m, combining elliptic curve cryptosystem and self-certified public key cryptosystem. The project has the following advantages:(1)Owing to based on elliptic curve over finite field F2m, the project has the following advantages: the shorter key length and the higher efficiency, and which is very suit for wireless environment;(2)adopting self-certified public key cryptosystems and verifying the validity of public key without certification, and that can reduce the operation of validating certification and the amount of computation;(3)0wing to no need of certification, the Certification Authority need not spend more time to manage the catalog of certification, so reduce the operation of CA;(4)Both verifying the validity of public key and identity authentication can be concurrently achieved.We also have studied scalar multiplication Algorithm which appear continually in this system and proposed some measures to improve the running efficiency of the program. Based on the analysis of security and complexity of system, we believe that the project can effectively reduce the length of key, complexity of computation and the cost of transmission, and that is very suit for mobile equipment and wireless...
Keywords/Search Tags:elliptic curve cryptosystem, identity authentication, self-certified public key cryptosystems, wireless environment
PDF Full Text Request
Related items