Font Size: a A A

The Research And Implementation Of Identity Authentication System Based On Elliptic Curve Zero-knowledge Proof

Posted on:2011-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:C Y WangFull Text:PDF
GTID:2178360302492058Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Authentication technology is an important aspect of the computer network security, it is the first barrier of protecting the network assets, and it provides a strong guarantee for the network information security. Especially, it takes a crucial position in need of dealing with a lot of money in the banking and insurance industry. The most popular authentication mechanism is basically based on the RSA algorithm, but with the improving security requirements, RSA key length is also increasing, which led directly to an increase in RSA computation. The appearance of Elliptic Curve Cryptography(ECC) created a huge challenge to RSA, the ECC's security is based on elliptic curve discrete logarithm problem (ECDLP), the ECDLP issues had so far found no sub-exponential time of the attack methods, and to achieve the same level of security, ECC keys are required much less than RSA's.However, these authentication still have some security risks, such as replay attack, off-line dictionary attacks etc. In order to solve the above problems, this thesis presents a zero-knowledge proof-based authentication technology, This technology is that when in process of certification, the permits can prove itself as a legitimate user without showing any useful information to the certifiers, which ensure information security.In order to achieve the research objectives of this thesis-the establishment of a safe and effective identity authentication system, the Zero-knowledge proof will now be introduced into the theory of elliptic curve cryptosystem, designed and implemented a zero-knowledge proof based on elliptic curve authentication system and applied to the insurance company management projects. The main work is as follows:(1) Studied of the mathematical theory of elliptic curves;(2) Study of the ECC system and concluded: Using the López-Dahab (LD) projection coordinate system can avoid the most time-consuming inverse operation and reduce the multiplication operation;(3) by the research of the core algorithm for ECC Scalar Multiplication Algorithm study it concluded that: The m-ary algorithm, to a certain extent, can decrease the computation time instead of the binary scalar multiplication algorithm;(4) By the study of the theory of zero-knowledge proof it concluded that: elliptic curve zero-knowledge authentication technology can effectively solve the safety problems, such as replay attacks, etc;(5)The present system is composed of arithmetical layers, the operation layer and protocol layer.The experiments show that the system runs stability in the testing process, and basically achieves the expected design goals on operational efficiency and safety.
Keywords/Search Tags:Elliptic Curve Cryptography(ECC), Theory of zero-knowledge proof, Authentication, Scalar multiplication algorithm
PDF Full Text Request
Related items