Font Size: a A A

Research Of Key Management Method Based On Elliptic Curve Cryptosystem

Posted on:2012-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:J S SunFull Text:PDF
GTID:2178330335972962Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In the information economy of society, network and information security becomes increasingly important, so it is an urgent requirement that information security is protected for the information age. The principle of cryptography requires that the security of cryptographic system does not rely on the confidentiality of cryptosystem or algorithm, but relies on secret keys. Key management which is an important part of cryptography requires that the cryptographic system contain good measures about key distribution and key management. Not only key management system affects the security of the cryptographic system, but also affects the reliability, effectiveness and safety of the application system. So far, key management remains a continuous emergence of new problems and challenges of complex issues.This paper summarizes the development status of key management system in the hierarchical system structure, and describes the classic hierarchical key management scheme and analyzes its security, and gives its advantages and shortcomings, and proposes a possible Roots Attack in the polynomial time for Jeng-Wang's scheme and Chung-Lee's scheme. Based on the Elliptic Curve Cryptography and One-way Hash Function, a new key management method which better handle key management issues under the dynamic access control is proposed, which construct a function using user level permission, in which once the hierarchical relationship structure in the hierarchical system structure to be changed, agent user can guarantee the security of applications system, and deal well responsibilities.
Keywords/Search Tags:cryptography, elliptic curve cryptography, key management, dynamic access control, one-way hash function
PDF Full Text Request
Related items