Font Size: a A A

Application Of Elliptic Curve Algorithms In Software Certification

Posted on:2011-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhangFull Text:PDF
GTID:2178360305971900Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Software is a technology-intense digital product. Although the development of software needs to devote massive resources of both manpower and materials, it is too easy to be copied. Accordingly, the protection to the copyright of software has always been a troublesome problem. The protection methods widely used include serial number, license etc. If the cost to crack the software exceeds that to buy, the effect of the protection is achieved in fact.The security of Elliptic Curve Cryptography(ECC)is based on the difficulty of elliptic curve discrete logarithm problem. And ECC provides the highest safe protection per bit of any cryptosystem known so far. Compared with other asymmetric encoding algorithm system, ECC also has many other advantages such as lower computation load, shorter key size, and considerable bandwidth savings. Therefore, ECC is considered as the best general public-key encryption system of next generation.Comparison to RSA, ECC has many good points, for example, a little occupied bandwidth and has many parameters to choosing in prime field and limited field, many research fruits about ecliptic encryption algorithm in the encryption and decryption field have been published around these years. The present research focuses concentrate on classic mathematical model in prime field Fp and limited field F2m. The author will explain the mathematic theory of ecliptic encryption algorithm first, followed by an emulation program, based on the classic ecliptic encryption algorithm y2 = x3+ ax + b to demonstrate the effectiveness of ECC. From the procedures, we can know that the only same set of parameters encrypt and decrypt the license can get the correct result.The example, programmed in C++, is a executable program of protection a license(including character) through(ECC)encryption function .
Keywords/Search Tags:date security, elliptic curve, elliptic curve cryptosystem(ECC), register code
PDF Full Text Request
Related items