Font Size: a A A

Based On Finite Field F <sub> 2 </ Sub> ~ M, The Identity Of The Elliptic Curve Cryptosystem Certification

Posted on:2004-09-29Degree:MasterType:Thesis
Country:ChinaCandidate:F WangFull Text:PDF
GTID:2208360122955042Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Research on the elliptic curve over finite field F2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. Because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. Indicate that making operation on the elliptic curve is very complicated. Analyze some correlation problem of using elliptic curve over finite field F2m to construct cryptosystem. The elliptic curve through affine transformation can be used to construct public-key cryptosystem and the operation through mapping transformation can facilitate the design of the algorithm and implementation in the elliptic.Expatiate on the ideas and methods of constructing elliptic curve cryptosystem over finite field F2m, build an elliptic curve cryptosystem which is easy to implement and secure. Design a user identity authentication scheme based on the elliptic curve cryptosystem. Up to now, there is no efficient attack found to the elliptic curve discrete logarithm of non-supersingular elliptic curve over finite field, so the scheme is secure in theory and practical. Additional the operation of it is convenient and the implementation is easier as well, so it is suitable for some practice such as electronic business and electronic voting etc.The most time consuming operation of the elliptic curve cryptosystems is the operation elliptic scalar multiplication, kP. We provide an efficient and fast algorithm for computing elliptic scalar multiplication on non-supersingular elliptic curves defined over finite field F2m. Our algorithm is easy to implement in both hardware and software, works for any elliptic curve over finite field F2m,requires no precomputed multiples of a point, needs less memory, and is faster on average than the addition-subtraction method. Therefore, the method possesses many desirable features for implementing elliptic curves in restricted environments.
Keywords/Search Tags:Public-key Cryptosystem, Elliptic Curves over finite field F2m, Elliptic Curve Cryptosystem, Identity Authentication, Fast scalar multiplication Algorithm
PDF Full Text Request
Related items