Font Size: a A A

Research Of Key Exchange And Encrypted Authentication On The Network Card

Posted on:2013-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:D H WangFull Text:PDF
GTID:2248330374472823Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology and network technology, the information security status in the network is more and more attention by people. Especially the problem of how reliable complete communication between network users is put forward, The network card in the application of encryption network by the people is getting more and more universal attention. In this paper, we select the FPGA chip based on chaotic encryption algorithm as the encrypted network card to encrypt information. Since the chaos system is sensitive dependent to the initial conditions, even a subtle variation of chaotic initial key will lead to great changes in ciphertext, therefore, the security exchange of chaotic initial key is particularly important.This paper based on elliptic curve cryptography algorithm to complete chaos initial key encryption algorithm of transmission, Using the chaos algorithm encryption chip after initial key reliable realized the purpose of the exchange. The article expounds the start of elliptic curve cryptosystem principle and how it is to realize information encryption theory, after the overall design module, for each part of the core module design completed all alone. This is the most important improvement of the bottom of multiplication algorithm finite field and elliptic curve encrypted point by algorithm, this makes the system to accomplish the encryption process faster. Then based on the elliptic curve encryption system this paper complete the relevant test and related simulation results, and the key of which is to complete this paper the design of system simulation test and the ECC to its comprehensive evaluation test, verified through analysis of the design of the system to accomplish the chaos initial decryption key reliable inter-changeable task. Finally, the study analyzed the certification agreement and network encryption card key exchange. Based on the research respectively key distribution center of the certification agreement and key exchange and based on the communication of both parties of the certification agreement and key exchange, and in the elliptic curve of the encryption algorithm based on the corresponding measures to make changes.This paper makes the elliptic curve encryption algorithm into chaos encryption chip of the perfect chaos encryption system, making system in unsafe channel also can complete chaos initial key security exchange request. Through the experiment demonstrates that the elliptic curve encryption and chaos encryption system both of the method of combining with feasibility, and easy to use hardware encryption card in the network to complete.
Keywords/Search Tags:Key Exchange, Elliptic Curve, FPGA encryption, Authentication protocol
PDF Full Text Request
Related items