Font Size: a A A

Research And Implementation Of Elliptic Curve Cryptography-Based Combined Public Key Technique

Posted on:2008-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2178360242958760Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Key manage pattern of PKI-based certification system has been used widely. But there is trust crisis among the CAs with the increasing of the trust chains. In this thesis, ECC-based combined key technique is studied and a new key management pattern which supports large scale keys management without supporting by background database and authentication by the third part, is proposed. Contrasting to the traditional key management, this new solution for keys management has great significance for research and implementation of the public key system in our country.At the first, the thesis introduces the math base of elliptic curve, including standards of ECC,comparing with RSA and solution for ECC.Secondly, the thesis shows the architechture of CPK based on ECC, including every module. At last by researching on the ECC-based CPK technique, the algorithm for selecting ECC parameters and the method for generating a private key using secret seeded matrix are explored during implementation of the technique. Specially, another new algorithm for generating a private key using secret seeded matrix is provided. The new algorithm can avoid the collision of calculating private key, which makes the original technique feasibility.In this thesis, experiments are based on FCLINT/C (Function for LargeIntegers in Number Theory and Cryptography) package, which could implement the big number operation theoretically. The package provides math and Numerical Theory functions, which could support the implementation of algorithm on different security level.
Keywords/Search Tags:elliptic curve cryptography, seeded public key, combined public key, private key factor, public key factor
PDF Full Text Request
Related items