Font Size: a A A

Implementation And Application Of Elliptic Curve Cryptography On IOS Platform

Posted on:2017-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y H QinFull Text:PDF
GTID:2348330503972463Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Twenty-first Century is the age of information. Cryptography, as the key technology of information security, has become more and more important. The public key cryptosystem with respect to symmetric cryptosystem has very obvious advantages, and the improvement of public key cryptography algorithm is the hot point of cryptography.As the new algorithm of public key cryptography algorithm, optimization and implementation of elliptic curve algorithm has an important significance.Elliptic curve cryptography is chosen as the research direction the theoretical basis and algorithm implementation of elliptic curve cryptosystem are studied, and the elliptic curve cryptography algorithm is optimized from several aspects. First, starting from the underlying operations of elliptic curve cryptography, optimizing elliptic curve cryptography, including selecting elliptic curve parameters, optimizing the most time-consuming point multiplication in the encryption and decryption process, as well as optimizing quadratic residue detection algorithm of elliptic curve cryptography, improves computational efficiency. Second, carefully designed elliptic curve cryptography structure hierarchy, developed elliptic curve cryptography framework with C language, which makes the algorithm secret key length variable and the function extended. And then,elliptic curve cryptography is applied to the IOS platform privacy protection, develop safe Notepad, escort for personal privacy, and verify the practicability of the elliptic curve cryptography framework. Finally, elliptic curve cryptography framework and notepad were tested. Elliptic curve cryptography algorithm framework is mainly tested from the two aspects of the function and efficiency of the algorithm, and then compare the performance before and after optimization. Safenote tests including UI testing, functional testing and stability testing. To ensure safe and stable.
Keywords/Search Tags:Cryptographic algorithm, Elliptic curve, Optimization algorithms, Safenote
PDF Full Text Request
Related items