Font Size: a A A

Elliptic Curve Digital Signature In E-commerce Applications

Posted on:2011-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2208330332477071Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Since its debut in 1978, RSA public key cryptography algorithm has been widely applied, but it also encountered big challenges in security aspect with the application of computer technology. Compared with RSA, elliptic curve cryptography algorithm has competitive edges such as shorter key, quicker computing, higher security and other characteristics, which makes elliptic curve public key cryptography algorithm a research focus at home and abroad. Due to the needs of information security, integrity and confidentiality in e-commerce, e-government and other online services, elliptic curve public key cryptography algorithm will completely replace RSA algorithm. Since 1987 when elliptic curve public key cryptography algorithm was proposed, various algorithms based on elliptic curve cryptography algorithm have been proposed, including the Elliptic Curve Digital Signature Algorithm (ECDSA), which was approved as FIPS 186-2 in 2000. This paper researches the various algorithms of ellipic curve and ECDSA algorithm, and devises a software and later optimize it, hoping that ECDSA can be applied to a variety of online services to ensure information security and integrity.Firstly, this paper introduces some basic cryptographical assumptions, tools, some common public key cryptography algorithms, digital signature algorithms and secure Hash functions, which builds a theoretical framework for the research. Secondly, the paper introduces the concept of elliptic curve and its derived algorithms, including elliptic curve public key cryptosystem and elliptic curve signature scheme. Based on these concepts, Chapter IV presents the core algorithms of elliptic curve and elliptic curve signature algorithm, as well as other related algorithms of cryptography, providing the basis for software implementation, and gives the software implementation of the relevant algorithms. Chapter V gives an application of the elliptic curve signature algorithm in feixiang net shopping.Finally, the paper concludes that the programme of elliptic curve signature algorithm is feasible, and needs continuous amendment and optimization in the future application of my work unit, before being promoted in wide online application of e-commerce, e-government and other online services.
Keywords/Search Tags:Information security, Elliptic curve, Elliptic curve cryptosystem, Digital Signature
PDF Full Text Request
Related items