Font Size: a A A

Optimization Based On Elliptic Encrypted Digital Signature Algorithm

Posted on:2016-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:L N YuFull Text:PDF
GTID:2298330470451420Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Present today, wireless communications more and more near to people’slives.Tech gives convenience to our lives,but also cause potential safety hazardcommunication.We compare common encryption as long as there are two methods ofsymmetric encryption and asymmetric encryption.the representative of the symmetricencryption are AES and DES, the representative of the asymmetric are ECC andRSA,The encryption security degree is higher,when face the practical problems,howto choose the most appropriate algorithm according to the situation becomesengineering research topic.Radio frequency identification technology is a non-contact RF communicationto achieve a use of automatic identification technology.RFID data exchange systemin open wireless status,outside easily implement a variety of information on thesystem interference.Electronic tag have main challenge is the capacity of small andlimited resources.ill tag,electric Faraday shield,symmetric encryption DES,AES,RSAasymmetric encryption method,etc.Although these encryption methods can protectadequate security,not suitable for RFID systems with limited resources.The currentRFID in the most widely used two kinds of encryption algorithm (RSA, ECC), theformer does not apply to limited resource of wireless communication,and the ellipticcurve encryption algorithm has a great advantage.Elliptic curve encryption algorithm belongs to public key algorithm, the targeton the elliptic curve is defined in the limited domain of Abelian group.Usedmathematical rationale: K=kG.Easy to see,given the easily calculate k and G K,butit is difficult to turn, calculate k,so security is very high.Elliptic curve cryptography is now able to adapt to a new cryptosystem futureinformation security technology forward,it ’s anti-exhaustive approach is to use alarge key space,so that the computing speed and storage space will occupy two verybig advantage.This article is for elliptic curve encryption algorithm,Reading reference a large number of references in both Chinese and English,summed up three major directionfor future research on Elliptic Curve Cryptography:①Choose safe fast elliptic curve;KIEEE P1363ECC working draft ellipticcurve uses a six parameter T=(p, a, b, G, n, h).These parameters directly affect thechoice of encryption security.②Effective computing elliptic curve order;Seeking order elliptic curvealgorithm have CM algorithm,Satoh algorithm,Harley algorithm,Schoof algorithmand SEA algorithm.③Points plus points and scalar multiplication on elliptic curve group.The main work of this paper is summed up in three directions according tocalculate elliptical selection,elliptic curve point addition and scalar multiplication onelliptic curves to optimize the three aspects,Preparation of the elliptic curveencryption algorithm optimization program,and experimental testing on the PC,getthe data.Has many advantages, its safety performance is very high, the runtime takeup less resources, so it has practical use value.
Keywords/Search Tags:ECC, Select the curve, SEA algorithm, Points plus, Scalarmultiplication
PDF Full Text Request
Related items