Font Size: a A A

Realization Of Authentication Algorithm Based On Bilinear Pairings

Posted on:2019-07-05Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhangFull Text:PDF
GTID:2428330572450659Subject:Engineering
Abstract/Summary:PDF Full Text Request
Under the background of the new era,with the rapid development of the social economy and the continuous innovation and progress of science and technology,people have a new understanding of the information computing management,and gradually develop towards the high level.At the same time,it is also fully aware of the necessity a nd importance of the network and information security.The widespread popularization and application of security authentication technology can not only guarantee the stability and security of information transmission from the source,but also create a relatively safe access environment.The development of network and information technology has brought about related security problems.Access control is one of the key technologies to solve the problem of network and information security.Security authentication and identity authentication are also the main components of access control technology.Identity authentication or authentication technology is usually based on cryptography,especially based on public key cryptosystem.Therefore,the security authentication technology based on elliptic curve encryption algorithm has become one of the key research areas in the security field.On the battlefield,information security determines the outcome of a war to some extent,and its importance is self-evident.In our army,most of the equipment and encryption methods used in information transmission are rather old.Some units are still using the equipment imported from abroad in the early years.The technology is relatively backward,and the performance of the equipment is also mastered abroad.This brings very big security risks to the success or failure of our possible future warfare.For encryption,we can never actually encrypt so that others can not crack it,but there is a difference in the time cost.Perhaps simple encryption can be cracked in a few minutes by someone using a hacker program,but if a higher-level encryption algorithm is applied,it may increase the difficulty of cracking an illegal person,so that the password may be cracked relatively long,perhaps several decades,but in such a time span,it is added.The content of the content may have lost its timeliness or may have become an open content.Just like in war,commander's order is time-sensitive.If our encryption method can't let the enemy crack the password during its time-sensitive period,so long as it can increase the difficulty of cracking the password and make the encryption content relatively safe within the time-limited,we think that such encryption algorithm is good.As an important application in cryptography,elliptic curve cryptography has more research significance because of its more security.In fact,a large number of elliptic curve cryptography schemes are proposed,such as the short signature scheme based on bilinear pairing,using the bilinear pairing based blind signature and ring signature scheme,and so on,involving many fields such as key negotiation,data encryption and digital signature.A lot of researches on elliptic curve cryptography have been carried out.In this paper,a authentication algorithm based on an elliptic curve based bilinear pairings is designed and implemented.On the basis of the study and analysis of the elliptic curve,a security authentication algorithm based on the bilinear pairing calculation is obtained.The algorithm is mainly implemented for the encryption,decoding and verification of the file,and through the experiment.The main work of the analysis is as follows:1.deep analysis of the elliptic curve correlation theory,deeply understanding of the theory and principle of elliptic curve encryption and decryption,analysis of its security,overhead and the feasibility of the general application,as well as the related problems.On this basis,a secure authentication protocol is proposed based o n bilinear pairings.2.according to the principle of encryption and decryption based on bilinear pairings on elliptic curves,a framework of security authentication protocol is designed.3.through the parameter selection method,a prototype of authentication algorithm is implemented in C language and tested.
Keywords/Search Tags:Elliptic curve, bilinear pairing, authentication, security
PDF Full Text Request
Related items