Font Size: a A A

Based On The Ecc Network And Information Security Encryption Equipment Design And Realization

Posted on:2009-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:J W YeFull Text:PDF
GTID:2208360272989526Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Internet development and application of information systems to enable interoperability on a global scale exchanged information and shared it possible. More and more Internet users to publish information and access to information anytime, anywhere information availability has changed the way people work, live and study ways and habits. However, it should be clearly recognized that the Internet brings convenience at the same time, then brought the issue of information security. In order to solve the problem of information security, all countries in the world after years of study scientists have made some effective solutions, PKI (Public Key Infrastructure) is a total that the most effective way, and based on the RSA key technology PKI solution is The most commonly used.Through compare ECC technology with RSA Key Technolog, prove the advantage of ECC technology, and bring forward a set of ECC-based PKI technology solutions. The solution will be applied to the development of encryption devices. Paper detailed the two ECC-based encryption technology products 1SPEC1256BX2S11 card encryption and uKeyCI800-KE USBKey ECC encryption devices Design and Implementation.ISPEC1256BX2S11 encryption card is an elliptic curve support of the seven parameters of the ECC encryption products, including four Chinese national standard curve and the curve of the three American Standard, in the allocation of server-side PKI system, internal hardware support for ECC encryption and decryption, signature and Signed inspection, generate really random number, SM1 States secret code division optimization algorithm. uKeyCI800-KE is a USB-based interface for portable communications network security products, the two countries to support the secret parameters of elliptic curves, built-in secret States SM1 algorithm for the client's signature user authentication, data encryption symmetry.By programming the hardware interface specification defined password-based National Bureau of the ECC standards of international popular of the two General Interface PKCS # 11 and OpenSSL had a custom development, the success of the ISPEC1256BX2S11 card encryption and ECC two uKeyCI800-KE In the allocation of encryption products to OpenCA-based platform, CA, presented the country with a secret key ECC certificate. GB ECC for the standard curve in the PKI system of internal promotion to open a channel technology, with a national standard ECC encryption products in the field of information security and advanced applications.
Keywords/Search Tags:ECC, encryption equipment, information security
PDF Full Text Request
Related items