Font Size: a A A

Research And Implementation Of Elliptic Curve Cryptosystem

Posted on:2011-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:J X DuFull Text:PDF
GTID:2178360308961580Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Along with the continuous development of information industry and extensive use of mobile Internet, mobile phone has become an indispensable part of our everyday lives. The mobile phone can provide more services than ever before, which also involve more security problems. The protection of user's personal information and data security has become an international issue. Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need. Elliptic curve cryptography is a kind of public key cryptography based on the elliptic curve discrete logarithm problem. It is safer and faster than the traditional algorithm, which makes it especially suit for mobile terminal.This proposed research is aimed to investigate the design and implementation of the elliptic curve cryptosystem. Based on in-depth study of elliptic curve cryptography, the implementation of a safe and efficient elliptic curve cryptosystem is achieved.In this thesis, the purpose and significance of this topic is discussed. At first, an overview of the public-key cryptosystem and introduction for the characteristics, status quo and evolution trend of elliptic curve cryptosystem is made. Secondly, the principle of ECC, including the math foundation and basic conception are expounded. Data encryption algorithm, key exchange algorithm and digital signature algorithm based on the elliptic curve encrypt scheme are analyzed. Meanwhile, the scalar multiplication algorithm is mainly study, and improved scalar multiplication arithmetic is brought forward. Accordingly the efficiency of operation is improved. Thirdly, the implementation of a safe and efficient elliptic curve cryptosystem is achieved. A new encipherment scheme that has the ability of certification and without plain text embedding is proposed. Finally, a test for the system is conducted and proposals for the research direction are made.
Keywords/Search Tags:information security, elliptic curve, elliptic curve cryptosystem(ECC), finite field, scalar multiplication algorithm
PDF Full Text Request
Related items