Font Size: a A A

Research And Design On Asymmetric Encryption And Decryption Algorithm Based On FFTT

Posted on:2012-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:W B LiuFull Text:PDF
GTID:2218330368988505Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the rise of electronic commerce and online bank, network and information security problems have been more and more concerned by people. So far, most of the solutions of information security are using the password encryption approach, but it has irreparable defects such as easy to forget and to be stolen so that it can not satisfied people with its security, meanwhile, it can not characterization the information of the people who released. In recent years, with the development and mature of the increasingly sophisticated biological characteristic recognition technology, combine with encryption and decryption algorithm, we can use it in information security, besides we can combine its biological characteristics such as uniqueness and stability with encryption algorithm so that it can protect information security.Based on the unique biological characteristics of fingerprint, we put forward a asymmetric encryption (decryption) algorithm which is based on the fingerprint characteristic point topology structure transform, its decryption depends on the topological structure equivalent transformation of fingerprint characteristics endpoint. By using the location data vector of the fingerprint characteristics endpoint as the topological structure transform object and the intersection location data vector of the fingerprint characteristics as the encryption (decryption) key, we can realize topological transform encryption. The uniqueness of the fingerprint has solved the problem of identity authentication, and the biological characteristics has realized the non-repudiation in electronic commerce.The research in this paper has put forward a fingerprint asymmetric encryption and decryption mode against the limitations of traditional data encryption and decryption algorithm. Besides, we did an analysis on the disadvantages of traditional data encryption and decryption algorithm which exist in modern information security, what's more, we introduced the asymmetric encryption and decryption algorithm based on the topological transform of fingerprint characteristic points in detail. By using Matlab, we have realized the foundation of topological structure model and the verification of topological equivalent transform, analyzed the security of the encryption algorithm, the results showed that the algorithm is reliable and efficient.At the end of the article, we verified the effectiveness security and performance of the algorithm and they all showed that the algorithm can improve the information security efficiently in modern network.
Keywords/Search Tags:Information security, Fingerprint characteristic points, Topological equivalent, Topological transformation, asymmetric encryption (decryption)
PDF Full Text Request
Related items