Font Size: a A A

The Research And Design Of A Random Encryption Scheme Based On ECC And RSA

Posted on:2016-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:S ZhangFull Text:PDF
GTID:2308330461483092Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the 21st century, the rapid development of computer technology and network technology has accelerated the process of the construction of management information system from all walks of life, which brings great convenience to people’s life but also brings new problems. It is that more and more account password need to be storage and managed safely. No matter when cryptography is an effective tool to protect the safety of data. So designing a safe and effective password management system is becoming more and more necessary.In these existing password management system, the account and the corresponding password is mostly saved in the form of plaintext, and the security of the whole important information in the system depends on the security of the system password which is called the super password as well. Once this super password has been cracked, the consequence would be unbearable to contemplate. If the account password saved in this system is encrypted respectively, it will produce n new passwords in order to protect the n old passwords, and this is the loss outweighs the gain. If it is a unified encryption, some account password leaks may cause leakage of the all of the account password saved in this system. There is also necessary to consider the convenience of using this system and the consumption of time and space resources.In response to these problems, this paper explored and designed an efficient and secure password encryption scheme in use of ECC and RSA which is two kinds of public key encryption algorithm. First of all, it needs to generate a random number as a selection code, and decide to encrypt in use of ECC or RSA according to the parity of the random number. Then, it’s time to design the confuse code taking use of the useful information which includes the select code, the length of ciphertext, the private key number. Finally, design a reasonable confuse rule, according to which we can mix the ciphertext and the confuse code bit by bit to form a new ciphertext which is final saved in the database of the system. The decryption is the inverse of the above process. The scheme in this paper can reduce the pressure of the super password and the degree of security dependence between the account password. In the system, it just needs to maintain the super password, confusion code generation rules and confuse rules.
Keywords/Search Tags:ECC algorithm, RSA algorithm, confuse code, random encryption, public key cryptosystems
PDF Full Text Request
Related items