Font Size: a A A

Research On Digital Signature Algorithm Based On Elliptic Curve Cryptography

Posted on:2012-12-14Degree:MasterType:Thesis
Country:ChinaCandidate:B Y YuFull Text:PDF
GTID:2298330467978002Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the high-speed development and application of computers and network technology, the security of information is becoming more and more important. Digital signature which plays a very important role in proving integrity, authentication and non-repudiation can generate a secure, fast signing through network. The security of elliptic curve cryptography is based on the difficulty of elliptic curve discrete logarithm. Comparing with the other public key cryptosystems, elliptic curve cryptography has many advantages, such as higher security, shorter private key length, higher calculation efficiency, less computation complexity, lower storage and bandwidth.In this thesis, digital signature based on elliptic curve cryptography was deeply researched and analyzed. On the basis of researching the theoretical basis of elliptic curve cryptography and digital signature technology, analyzed the security of elliptic curve cryptography by commonly used attacks to the elliptic curve discrete logarithm problem algorithms, also got two generation methods and formulas for security elliptic curve. Improved the elliptic curve digital signature algorithm, verified the correctness and analyzed the security of two improved algorithms. There is no need for the signer of the improved algorithms to do the inverse operation, then it has less computation complexity than the traditional algorithm. Therefore, the improved algorithms have a certain practical value, and more suitable for the signer who has weak computing power. In addition, improved a elliptic curve digital signature algorithm which has the message recovery, it has higher security after improved.
Keywords/Search Tags:elliptic curve, discrete logarithm problem, digital signature, elliptic curvedigital signature algorithm
PDF Full Text Request
Related items