Font Size: a A A

Elliptic Curve Cryptosystem's Implementation And Application In The Electronic Business

Posted on:2007-11-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178360185467685Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of computer science and telecommunication networks technology, the electronic commerce has become more and more thriving in the past decade, while the security of an electronic commerce system is the key issue. As the researches on the elliptic curve cryptology go further and further, the technologies on it also become increasingly sophisticated. Due to the evident advantages of it, elliptic curve cryptology has been adopted as the default public key cryptosystem in the next Secure Electronic Transaction(SET). There are many elliptic curve cryptography algorithms by far and no definite ones are recommended in the next SET, so the research on how to apply elliptic curve cryptography to the SET means a lot to the development of an electronic commerce system based on the SET.The research in this dissertation is mainly about the application of elliptic curve cryptography in electronic commerce systems based on the SET. The dissertation consists of four chapters. In Chapter One, the relative background and what the research has been done are briefly introduced; in Chapter Two, the main principles about elliptic curve cryptography are involved, including the definition of the elliptic curve used in cryptography, the public key cryptography protocols based on elliptic curve and the known attack to elliptic curve cryptography; in Chapter Three, the implementation issues on the elliptic curve cryptosystem are discussed, including the selection of system's parameters, the arithmetic and modular algorithms on a finite field, the elliptic curve algorithms, and the encryption/decryption and the signature/verification algorithms; the development of the electronic commerce, the security framework and the SET procedure are introduced in Chapter Four, and the researcher presented an elliptic curve encryption/decryption scheme here, based on the analysis of the application of public key cryptography in the SET.What the researcher has done in the dissertation includes: (1) implemented an elliptic curve cryptosystem; (2) tested the main point multiplication algorithms' performances in a specific environment; (3) presented a practical method for the keys generation about the ECIES in the IEEE P1363 standard and implemented it; (4) presented an encryption/decryption scheme based on modified ECIES in the SET and analyzed the performance of it. The discussion on the implementation of an elliptic curve cryptosystem and the tested data on the performance of main point multiplication algorithms will benefit those who want to implement such a system, and the method for the keys generation about the ECIES in the IEEE P1363 standard as well as the scheme in the SET based on it not only can be implemented easily and universally, but also has the assured security, which means good application to the electronic commerce systems based on the SET.
Keywords/Search Tags:elliptic curve cryptography, electronic commerce, SET, integrated encryption scheme
PDF Full Text Request
Related items