Font Size: a A A

Crt-mc-based Public Key Cryptographic Algorithm Encryption System Design

Posted on:2007-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:J C ChengFull Text:PDF
GTID:2208360212460483Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the Internet development, the network has provided the enormous convenience for the people. But because of the deficient security of the Internet TCP/IP protocol itself which provides one kind of open style environment, the network security becomes one of the essential technologies in the open style environment. Network security includes two contents: First is the network resources security, Second is the data exchange security. Realizing the data exchange and transmission security truly in Internet, it must satisfy confidentiality, the authenticity, the integrity, undeniableness. The Public-Key Cryptography, which is one of the mathematics cryptogram theory and technology, can provide the safe encryption channel to exchange the data in Internet.This thesis has carried on the discussion from the following several aspects to the Public-Key Cryptography and the algorithm realization.The first, this thesis introduces one kind of new encryption algorithm-Matrix Cover (MC) Public-Key Cryptography (CRT-MC for short) based on Chinese Remainder Theorem (CRT). By carrying on the analysis of security and design variable of this encryption algorithm, it draws the conclusion: the encryption speed superiority of this algorithm is obvious; at the same time the algorithm is safe which resists effectively each kind of attack. Then based on the CRT-MC Cryptography algorithm, it discusses the hardware and software realization of the encryption and decryption process in detail, and discusses with emphasis on the realization of the long integer multiplication and addition, the modulo function and the squaring root function, etc.The second, in view of the encryption part of the CRT-MC Cryptography algorithm, the thesis produces three kinds of encryption systems realization based on the computer, Application-Specific Integrated Circuit(ASIC) and...
Keywords/Search Tags:CRT-MC, cryptogram, security, Public-Key Cryptography, MC, ASIC, SOC
PDF Full Text Request
Related items