Font Size: a A A

Software Design And Implementation Of SM2Elliptic Curve Cryptography

Posted on:2015-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:J J LiFull Text:PDF
GTID:2298330467954738Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
ECC, a public-key cryptography algorithm, which stands for Elliptic CurveCryptography is proposed independently by Neal Koblit and Victor Miller in1985. Usingthe finite point groups of the elliptic curve over the finite field instead of the finite cyclicgroups that based on the discrete logarithm cryptosystem, it has a higher level ofsecurity.Compared with other public-key cryptosystems such as RSA, ECC hasadvantages of shorter key, faster operation speed, smaller key storage space and lowerbandwidth requirements that is why it is widely used in the IC card and otherresource-constrained environment. As a result, research and implementation of ECC willhave positive significance for its development in the future.The fast implementation of Elliptic Curve Cryptography Algorithm has been thefocus of the elliptic curve cryptosystem research field. Elliptic curve public keycryptography algorithm of SM2includes cryptography schemes such as digital signature,public key encryption as well as key exchange protocol and so on. After studying thebasic theories and related arithmetic operations of the elliptic curve cryptography, thispaper completed the software design and implementation of the elliptic curvecryptography scheme SM2. The main work of this paper includes:(1) Based on the function of the digital signature that verifying the integrity andvalidity of the information, SM2elliptic curve digital signature algorithm is studied andthe relevant software design and implementation are completed;(2) Based on the function that achieving the information encryption, decryption andpreventing the secret information leakage of the public key encryption algorithm, SM2elliptic curve public key encryption algorithm is studied and the relevant software designand implementation are completed;(3) Based on the application of the key exchange protocol in the field of keymanagement and consultation, SM2elliptic curve key exchange protocol is studied and the relevant software design and implementation are completed.Using the idea of modularization design and method of top-down, stepwiserefinement approach, in this paper, the SM2elliptic curve cryptosystem is analyzed anddesigned in detail. Finally, through the system functional test, a complete SM2ellipticcurve cryptosystem based on windows platform is achieved.
Keywords/Search Tags:Elliptic curve cryptography, Digital signature, Key exchange, Encryption, Decryption
PDF Full Text Request
Related items