Font Size: a A A

The Research Of Elliptic Curve Point Compression Techniques And System Security Evaluation

Posted on:2012-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:D MaoFull Text:PDF
GTID:2218330368481256Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
attracted more and more concerns and been pay more and more attention. In recent year, governments have invested much on information system security classified protection and cryptography field. Colleges and research institute also did fruitfully on these fields.Elliptic curves cryptography system plays an important role in the cryptography researching and application filed. It is a hot application system and causes widespread concern in the field of cryptography and information security in recent years. Under the condition of equal security strength, elliptic curves cryptography has the advantages of comparative short key length, less computational cost, and occupying little storage space and bandwidth. Therefore, it has extremely brightening application and development prospect under the resources limited situation like wireless network environment.Information system security classified protection is the method which uses cryptography and other security technology systematically for the classification protection of information system. Penetration test is one of the hottest researching fields in recent information system security classified protection.The major jobs of this paper include the following two respects:Firstly, this paper researches the most capable encryption system under resources limited wireless network, by studying how to save bandwidth under transmission of cryptography system and computational cost under encryption and decryption. Therefore, we obtains the following results, by applying X-only point compression technology on Edwards elliptic curves:①double point compression scheme on Twisted Edwards curves;②triple point compression scheme on Twisted Edwards curves;③m ultiple point compression scheme on Twisted Edwards curves. Meanwhile, we use X-only coordination for scalar multiplication and paring computation. It is shown by algorithm efficiency analysis that, X-only point compression technology saves lots of bandwidth during the transmission of elliptic curve cryptography system. At the meaning time, its computational cost is much lower than standard point compression technology. Thus, the scheme we are studying is very suitable for using in the wireless network.Secondly, governments have paid much attention on information system security classified protection, and experts and scholars also studied it steeply, especially in the respect of penetration attack. This paper studied the practical application of tools scanning and automatic penetration test in information system security classified protection, and designed the schemes of security evaluation tools which we used in practical information system security classified protection evaluation. Moreover, this paper designed the simulation scheme of information system automatic penetration attacks. The simulation results of real application environment shows that, the tools scanning scheme and automatic penetration attacks we designed have bright promotion prospect in the information system security classified protection evaluation.
Keywords/Search Tags:elliptic curves cryptography system, twisted Edwards curves, point compression, information system security classified protection, penetration attacks
PDF Full Text Request
Related items