Font Size: a A A

Implement Elliptic Curve Algorithm Based Authentication Technology

Posted on:2014-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhaoFull Text:PDF
GTID:2268330425483058Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As people on information security requirements gradually increased,authentication technology occupies an important position in the security system, userauthentication is an important manifestation of authentication technology, whenconsistent with their actual identification of the user identity is the identity,authentication will play a key effect.Authentication technology, security is a major factor to consider, andcryptography is the basis of data security. Elliptic curve algorithm can be implementedin a very short to achieve a sufficient level of security keys. Its security is based onelliptic curve discrete logarithm problem of intractability. Elliptic curve encryptionalgorithm is asymmetric encryption algorithm has the highest per-bit security strength.This thesis describes the asymmetric cryptography algorithm, the basic theory ofelliptic curve algorithms on elliptic curves over finite fields, key exchange protocol,encryption methods and security analysis ECC, followed by the description of thehospital information system certification identification, authentication and keymanagement certification news, with a focus ECC digital signatures to achieve,through the choice of elliptic curve parameters, key generation step, combined with asignature protocol combined into a proxy signature system, research elliptic curvealgorithm and validated, designed a set of algorithms based on ECDSA digital signaturecertification scheme for hospital information systems technology, analyzes the systemarchitecture and the entire process, and ECDSA digital signature of the simulation, thefinal analyzes its security. And draw ECC encryption algorithm than the other revealed ahuge superiority, its safe and effective. Finally came to the conclusion, discusses theapplicability of the proposed algorithm.
Keywords/Search Tags:authentication technology, elliptic curve algorithm(ECC), digitalsignatures, data security
PDF Full Text Request
Related items