Font Size: a A A

How To Manage The Secret Key Of Elliptic Curve Cipher System And The DSP's Implications

Posted on:2009-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:P FanFull Text:PDF
GTID:2178360245495648Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
With the developing of IT and internet, the data which transmated via internet become more and more. Because the current network is not safe and it does not protect the security of the transferred data. If the attack is not detected,the result is serious. In order to provent the data from being sniffered and modified and forged by the illegal user,cipher technology is needed. Cryptography is a kind of science that is about cipher technology, it is the integration of computer science and communication science. What will be worked over in this article is one kind of public key cryptography. Its security is based on the difficulty of computing the discrete logarithm. Its security is based on the difficulty of big integer fragmentation. Elliptic curve discrete logarithm problem is a difficult problem and it is more difficult than discrete logarithm problem. The scheme has shorter key length and shorter signature length than the scheme based on discrete logarithm problem and has the same security .Shorter key length can save space , the amount of calculation and the amount of transferred information. Then this article will put the elliptic curve cipher system into my way.In 1979, Shamir and Blakley put the conception of private key be separated by several person. Which can be realized this scheme is called (t,n) threshold scheme. This scheme let the management of private key more easy.Because elliptic curve is a kind of cipher arithm which is more available and more safe,the private key which is encrypted by this cipher arithmetic is more available and more safe.If this private key can be managed by (t,n) threshold scheme.It will be perfect.Some one has been bring out this way at home and in abroad. But no one has been come true it. I has lived three years to sduty the computer secutity. What's more.during 2006-2007,1 have done scientific research work in Jinan Listen Cops. By my hard working,I have learned a lot about how to use embed system to design cipher algorithm. So the application of scheme which uses (t,n) threshold scheme managing the private key elliptic curve cipher arithmetic created is pop and significant!...
Keywords/Search Tags:Elliptic Curve Cipher System, discrete logarithm, threshold scheme, DSP
PDF Full Text Request
Related items