Dissertation > Excellent graduate degree dissertation topics show

Study on Elliptic Curve Cryptosystem

Author: ZhangMing
Tutor: QianJiang
School: Nanjing University of Technology
Course: Applied Computer Technology
Keywords: Information Security Elliptic Curve Elliptic curve cryptography (ECC) Secret sharing
CLC: TN918.6
Type: Master's thesis
Year: 2004
Downloads: 309
Quote: 8
Read: Download Dissertation

Abstract


Elliptic curve cryptography ( ECC ) security is based on the intractability of the elliptic curve discrete logarithm problem . It is by far the bit with the highest security strength of the password system . Compared with other asymmetric encryption system , Elliptic Curve Cryptography in addition to safety , but also has the advantages of computational load , short key size , low bandwidth , so elliptic curve cryptosystem is considered to be the next generation of the most common public key cryptography system . This paper first introduces the research background , research status , developments and elliptic curve cryptography technology history and current situation . Second , we introduce the mathematical basis of ECC point arithmetic of elliptic curves over finite fields rules are described in detail . , Research ECC system algorithm implementation issues , and made ??a comparative study of key algorithms and optimization algorithm , given the specific implementation results . Fourth , we propose a new dynamic secret sharing scheme , and it was analyzed . The results show that the proposed scheme can be dynamically updated shared secrets and members of the sub- key owned by the members of the private key is no need to change , to solve the traditional secret sharing scheme updates and reuse . It also can detect the dishonest members and the detection equation does not leak secret information to address the existence of other programs can not prevent fraud and the verification equation leak problem . Compared to some of the existing programs , we referred to the security of the scheme is based on solving the elliptic curve discrete logarithm problem , which has a higher security . In addition, the amount of computation of the proposed scheme is not efficient , suitable support for elliptic curve public-key cryptosystem . Finally, the ECC trends and research directions are discussed.

Related Dissertations

  1. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  2. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  3. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  4. Study on Information Security of C Company,F270.7
  5. Study on Information Management Security and Countermeasures of A Power Supply Company,F426.61
  6. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  7. Digital Information Resources System Security Risk Assessment,G353.1
  8. Secret sharing scheme,TN918.1
  9. Design and Implementation of the online bidding system for information security,TP393.08
  10. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  11. Study of several secret sharing scheme,TN918.1
  12. Research of the Rational Secret Sharing Technology,TN918.1
  13. Rootkit technology in the Third-Party Information Security System Research,TP309
  14. Telecom companies Information Security Risk Management Research Project,F626
  15. Forum posts for the text orientation analysis,TP391.1
  16. Research on Intelligent Monitoring and Management System Technique Based on the Wireless Sensor Networks,TP212.9
  17. Trojan Principle Analysis and System Implementation,TP309.5
  18. Power grid enterprise power marketing business risk management applied basic research,F426.61
  19. The Dynamic Distributed network intrusion patterns,TP393.08
  20. A Research on Trust Based Access Control in P2P Network,TP393.08
  21. Some Studies on Threshold Secret Sharing Schemes,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Secure communication : structural principle points
© 2012 www.DissertationTopic.Net  Mobile