Font Size: a A A

The Research Of Information Security System Based On Elliptic Curve Cryptosystem

Posted on:2008-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y TianFull Text:PDF
GTID:2178360215959525Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the fast development of computer network and electronic commerce, the problem of information security becomes more and more important. Even becomes the influence strategic question of national security and social stability. How to transfer information securely in the open network has become hot field for research and application in domestic and in abroad.The information security core is encrypts technology, and encrypts technical core is encryption algorithm. This thesis uses the elliptic curve encryption algorithm. The elliptic curve cryptosystem provides the highest strength-per-bit of any cryptosystems so far. ECC has many merits over other public-key cryptosystems such as high security, less computation overheads, shorter key size, considerable bandwidth savings, and so on. It is becoming the public-key cryptosystem that is suitable for current use in future.This thesis mainly designs and realizes an information system of authentication, access control and data encryption. Firstly, after research the current security model, we realize the security access based on BLP secret model and RBAC role access control model. Then, after investigating the ECC, we select the security elliptic curve parameter to guarantee the security of the entire system. We choose the NIST recommended elliptic curve P-192 after test. And then, we improve the scalar multiplication algorithm of elliptic curve encryption and use a method of calculating kP based on elliptic curve of Montgomery form. The algorithm has proved to have simple realization and fast computational speed.According to the above improvements and optimizations, we design and realize the information security system based on Windows platform. The analysis proves that, this system has a better security and efficiency.
Keywords/Search Tags:Elliptic Curve Cryptosystem (ECC), information security, access control, scalar multiplication algorithm
PDF Full Text Request
Related items