Font Size: a A A

The CPK Algorithm For Digital Authentication Technology

Posted on:2015-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhuFull Text:PDF
GTID:2298330422486493Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the network, the digital campus system is graduallybuilding and developmented, the security issues of digital campus network is alsoincreasingly significant, a lot of digital campus network are in danger of being attacked, inorder to ensure that the digital campus network security, this paper based on Research CPKdigital authentication algorithm combinations keys.This paper first analyzes and compares the existing authentication technologies: IBEauthentication technology, PKI authentication technology and CPK authentication technology,and CPK authentication based on the principle of technology and algorithms, functionmodules and certification process to do the analysis. After the Department focuses on the corebuild CPK authentication method, select Security elliptic curves for randomly selected ellipticcurve safety and low efficiency problem, this paper proposes a new selection of securityelliptic curve method, namely particle swarm optimization. Finally, a comparative analysisexperiments using random curve and use the difference between the security of elliptic curvebetween the PSO algorithm and the resulting advantages and disadvantages.The experimental results show that the PSO algorithm to select the security elliptic curvethan select a random elliptic curve method security efficiency curve is better, up fromcomparative safety, the use of anti-attack capability PSO generated security than elliptic curvecurve generated using random security elliptic curve better.
Keywords/Search Tags:CPK, elliptic curve, authentication system, combination key, Particle SwarmOptimization
PDF Full Text Request
Related items