Font Size: a A A

The Commodity Guards Against The Pseudo-code System

Posted on:2007-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2178360242977715Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Currently, the idea of the traditional passive prevent counterfeit products have been totally beyond, computers, network communications, information coding, digital printing and other high security applied to all fields of science and technology has become a trend. The rapid development of technology in today's security, more and more security system in the value of various encryption algorithms to achieve security code generation and verification of digital security technology must be integrated with the latest scientific techniques and applications can continue to maintain efficient, safe, cheap and reliable advantage. This article in analyzes the new generation of encryption algorithm in the foundation, proposes deciphers based on male key mechanism -Elliptic Curve algorithm Canada realizes guards against the pseudo-code the production and the confirmation, guards against the commodity false technical and the password code study newest achievement unifies. The plan design while has higher security reliable, the maintenance relatively inexpensive cost, contrasts other to guard against the false system even more to conform to China's national condition, suits various sizes enterprise to guard against falsely hits the vacation, protects own benefit. In this paper, a complete algorithm based on Elliptic Curves Cryptosystems (ECC) of the Commodity Code System Design, focusing on elliptic curve algorithm in commodity security code generation and verification of application integration and conducted an in-depth analysis and research to establish a distributed coding verification platform, open platform for the world all aspects of the exposition,and the completion of the procedure for the preparation of the code, including commodity security code procedures, certification procedures, as well as the world's two popular platforms (Internet, text messaging platforms) the design and so on.
Keywords/Search Tags:Commodity Code, ECC, Ellipse curve, Security code generator, Certification
PDF Full Text Request
Related items