Font Size: a A A

The Optimization And The Implementation Of GF(31) Of UOV Signature Algorithm And Its Vectorization Programming

Posted on:2018-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:2348330533466802Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cryptography has always been the most important basis of information security,and information security in all the theories and practices are based on cryptography.With the advent of the information age,cryptography as an important tool to protect information security,has been rapid development.In the symmetric cryptosystem,well-known algorithms such as DES symmetric encryption algorithm and AES symmetric encryption algorithm are developed.In the asymmetric cryptosystem,RSA algorithm,Elgamal algorithm and ECC algorithm are developed.In the 1990 s,Shor P.proposed a quantum attack that originally required exponential time in attacking the RSA algorithm,the Elgamal algorithm,and the ECC algorithm.Now,only the polynomial time is needed,which is undoubtedly a disaster for the traditional public key cryptosystem.Fortunately,there is no ideal computing power of a quantum computer.However,in 2016,with the world's first quantum science experimental satellite,Quantum Experiments at Space Scale(QUESS),of the successful launch,a symbol of the rapid development of quantum computer technology,means that quantum computer technology is about to mature,the protection of information security needs a Set of anti-quantum attack password scheme.Multivariate Public Key Cryptosystems(MPKC)is an asymmetric cryptosystem that can effectively combat quantum attacks.It was suggested as early as the 1980 s.In the mathematical point of view,MPKC solves the nonlinear multivariable system based on finite field.In 1999,the Unbalance Oil-Vinegar(UOV)was first proposed,and today it is still popular in MPKC research.However,over the years,the study of UOV is more than just staying in theory,which results in far more ideal in terms of concrete implementation.In this paper,the UOV signature algorithm of (31)is implemented in detail,and its data structure and the underlying operation are optimized.And then,vectorization programming is optimized.Finally,the results of this paper are compared with the UOV signature algorithm of (31)based on NTL,which is widely used in the research,and the RSA signature algorithm of openSSL.The results show that the UOV signature algorithm of (31),which is optimized data structure and the underlying operation performance on all-round beyond the NTL library to achieve the program,but also in the signature and verification efficiency than openSSL-RSA performance is excellent.
Keywords/Search Tags:Multivariate Public Key Cryptosystems, Unbalanced Oil-Vinegar Signature Scheme, matrix operations, AVX2 instruction set
PDF Full Text Request
Related items