Font Size: a A A

Research And Application Of CA Authentication System Based On Elliptic Curve

Posted on:2011-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:T G ShenFull Text:PDF
GTID:2178330338478044Subject:Mechanical and electrical engineering
Abstract/Summary:PDF Full Text Request
Presently, PKI is the best mechanism to protect network information at the application layer. However, with the development of the fractional step method and in-depth study of number theo- ry, RSA pub-key cryptosystem, which is widely used by PKI ,is facing unprecedented challenges. For the RSA security risks, paper adopted ECC, which is more security and efficient, as the PKI cryptographic techniques'pub-key cryptosystem, then built CA authentication system based on PKI cryptographic techniques, to solve the identity authentication of two communication sides in the interaction process, the integrity and confidentiality of information transmission, and the non-repudiation of operation. The main work in the paper as follows:1. Paper studied the PKI system and PKI cryptographic techniques which are needed to build CA authentication system. From the system's efficiency and safety point of view, chosen ECC as the pub-key algorithm of CA authentication system, through in-depth anaysis of ECC, lay the foundation for the achievement of the PKI cryptographic techniques.2. Through PKI cryptographic techniques, which based on ECC pub-key cryptosystem, designed and achieved CA authentication system. Firstly, on the base of functional requirements and system aims, paper built the overall framework of CA authentication system. Secondly, on this basis, paper focused on the design of certificate requestion's process in client side and server side. Finally, based on the design of CA authentication system, paper archieved the relevant module's key techniques in physical components with development tools.3. Tested and analysis of the CA authentication system and key techniques.Firstly, tested and analysis of the PKI cryptographic techniques which based on elliptic curve cryptography and required by CA authentication system. Secondly, tested CA authentication system, results show that the CA system has higher efficiency and security which were based on elliptic curve than based on RSA. Finally, to the network security needs of E-Stamp system, applied the CA authentication system to the E-Stamp system, it has achieved secure authentication of identity and secure transmission of information in the interaction process of two communication sides。...
Keywords/Search Tags:public key infrastructure, elliptic curve cryptography, CA certification, ECC digital certificate, electronic stamp
PDF Full Text Request
Related items