Font Size: a A A

A New Elliptic Curve Encryption Method And Key Exchange Protocol

Posted on:2010-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:B T LiFull Text:PDF
GTID:2208360275496815Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
Elliptic curve cryptography is based on the elliptic curve public key cryptography as a mathematical approach. Elliptic curves in cryptography are in use in 1985 by Neal Koblitz and Victor Miller independently proposed separately.The main advantage of ECC are in some cases, other methods than the use of a smaller key - such as RSA - or provide a higher level of security. Elliptic Curve Cryptography many slightly different forms, all are dependent on the solution has been widely recognized elliptic curve discrete logarithm problem on the difficulty, the corresponding elliptic curves over finite fields on the group.The subject of elliptic curve cryptography based on research, exploration, according to the literature [14] probability structure of the general method of cryptography, a new structure of elliptic curve encryption system, in line with polynomial security. Elliptic Curve Cryptography because of the security situation in the same key length of RSA key length than many smaller, and therefore the probability based on the RSA encryption system compared to the same security encryption faster than the case of probability based on the RSA encryption system quickly well. For elliptic curve cryptography-based Signature regard, this paper constructed in accordance with Lamport signature scheme based on an elliptic curve signature scheme based on finite fields in general discrete logarithm problem Lamport signature scheme constructed compared to the effective data reduces Signature length, then Chaum and van Antwerpen in accordance with the design of elliptic curve-based undeniable signature scheme. Communications Security in communication before the two sides need to negotiate a common key to the contents of the communication encryption and decryption of the right, which has required key agreement scheme, the paper also key agreement scheme has been improved so that it intermediaries can take the initiative to attack the resistance.
Keywords/Search Tags:Cryptography probability, Elliptic Curve Cryptography, Digital signature, Key Agreement
PDF Full Text Request
Related items