Font Size: a A A

Research And Analysis Of The Security Of Public Key Cryptosystem

Posted on:2007-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:P S WangFull Text:PDF
GTID:2178360182986410Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The development of public key cryptosystems as a whole is the largest in the history of cryptography and perhaps the only real revolution. From the initial until modern, almost all cryptosystems are built on the basis of alternative and replacement tools, and public key cryptosystems are different with all previous methods. While public key algorithms are based on mathematical problems rather than substitution and replacement, on the other hand "it a non-symmetrical", which used two different keys included public key and secret key. It can effectively solve the problem of key management and allocation of traditional key cryptosystem, digital signatures, identity authentication and so on.Since the concept of public key cryptosystem has been proposed, many public key cryptosystem programmes have been made such as RSA, backpack system, McEliece, ElGamal system, ECC, XTR, NTRU and so on. In constant research and practice, some programmes have been found and some programmes are not practical. The thesis analyzes the research status of the known public key cryptosystems, against its existence, such as: computers slow, and the calculation of volume, storage capacity and transmission capacity, and expressly embedded difficulties, low safety, does the next work:First, proposes the public key encryption system based on circular cone curve, which makes the encryption, dencryption, and Plaintext embed more eastly.Second, proposes an algorithm of the new encryption algorithm synthetic methods for public key cryptosystem as an example, which improves the security of the encryption algorithm.
Keywords/Search Tags:Public key cryptosystem, Security, Discrete logarithm problem, XTR, Braid group, NTRU
PDF Full Text Request
Related items