Font Size: a A A

Research Of RSA Algorithm And SM2 Algorithm

Posted on:2016-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhangFull Text:PDF
GTID:2308330464962592Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Now society has entered the information age, global development of network technology has completely changed the way people deliver information and methods. These technologies have penetrated into every aspect of life, become important means of communication. Human activities are increasing, how to use cryptography to ensure information security, cryptographic algorithm efficiency requirements increase, put forward new requirements for data-processing mode, so this paper focuses on these two aspects of the content.This paper describes traditional RSA algorithm, and studied the method of Chinese remainder theorem CRT(China Remain Theorem) to simplify data operation, as the problem of data orders of magnitude increase and RSA operation efficiency reduce, combining the RSA algorithm improvement of CRT and traditional RSA algorithm the RSA algorithm with the Chinese remainder theorem coefficient, known as the RSA algorithm based on the Chinese remainder theorem. And in the computer uses Miller Rabin Prime test method, and big prime of generated and CRT coefficient of solution this three steps achieved this improved algorithm, compared improved before and after two species algorithm of operation efficiency, results displayed improved algorithm operation efficiency improve has close four times, last put improved of RSA algorithm application to password equipment to achieved algorithm function, and built simulation platform do application test.The RSA algorithm is based on the difficult of large prime factorization, and the discrete logarithm problem is difficult to solve in practical application, currently, the ECC algorithm is used to deal with the discrete logarithm problem, but it has not uniform standard to coding. Therefore,this paper proposes a method to improve ECC algorithm for avoid the ECC algorithm code simultaneously effectively. This paper combine SM3 algorithm and the international ECC algorithm which based on the discrete logarithm problem to realize SM2 algorithm, firstly, this paper introduce the method to realize the SM3 algorithm, then comparing ECC algorithm and SM2 algorithm, it is result show that in process of operation SM2 algorithm has dominant position to ECC algorithm, the advantage is the SM2 algorithm reduces the data encoding and decoding operations, improves operational efficiency, also enhances the capacity of the key length, increases the function of correctness verification plaintext. And the SM2 algorithm is application to the authentication server, building the simulation test environment. Firstly, testing the function of SM2 algorithm, and then realize the identify authentication, finally, do the test of identify authentication.This article improves the traditional RSA algorithm and international ECC algorithm, it has improvement in computational efficiency, but it has not analysis in the space complexity, and also how to optimization algorithm needs to be improved.
Keywords/Search Tags:RSA, China Remain Theorem, ECC, SM2, Identify Authentication
PDF Full Text Request
Related items