期刊文献+

基于大素数域的椭圆曲线密码设计与实现

DESIGN AND IMPLEMENTATION OF ECC BASED ON LARGE PRIME NUMBER FIELD
在线阅读 下载PDF
导出
摘要 为了能实现椭圆曲线密码高效加解密,给出一种基于大素数域的NIST推荐的192位以上的标准椭圆曲线加解密的程序结构,并实现了(192,224,256,384)四条椭圆曲线加解密。实验结果表明,采用多精度加减法、乘法以及除2等算法能够高效地得出加解密结果,从而使方案可适用于对加密性能要求较高的场合。 To realize encryption and decryption of ECC efficiently, a standard and more than 192 bits ECC program structure of encryption and decryption is given in the paper. It is proposed by NIST and based on large prime number field. Besides, four ( 192bits, 224bits, 256bits, 384bits) ECC of cncryption and decryption are completed by the author. Experiments show that the use of algorithms in the paper, such as muhi-precision addition and subtraction, multiplication as well as division by 2 can efficiently get the results of encryption and decryp- tion, so that the new solution can be applied to occasions requiring higher performance of eneryption.
出处 《计算机应用与软件》 CSCD 2010年第8期44-48,共5页 Computer Applications and Software
基金 国家自然科学基金项目(60463002) 云南省应用基础研究基金项目(2007F008M)
关键词 椭圆曲线密码 大数 密钥生成 加解密 Elliptical curve cryptography (ECC) Large number Point Key generation Encryption and decryption
  • 相关文献

参考文献6

二级参考文献29

  • 1Koblitz N. Elliptic Curve Cryptosystems[J]. Mathematics of Computation,1987,48:203-209.
  • 2Miller V. Uses of Elliptic Curves in Cryptography[A]. Advances in Cryptology-Crypto'85, LNCS218[C]. New York:Springer-Verlag, 1986, 417- 426.
  • 3Gordon D. A Survey of Fast Exponentiation Methods[J]. Journal of Algorithms, 1998,27:129-146.
  • 4Lim C, Lee P. More Flexible Exponentiation with Precomputation[A]. Advances in Cryptology-Crypto'94, LNCS839[C]. New York:Springer-Verlag, 1994, 95-107.
  • 5ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985,31:469-472.
  • 6National Institute of Standards and Technology. Digital Signature Standard[S]. FIPS Publication 186,1993.
  • 7Johnson D, Menezes A. The Elliptic Curve Digital Signature Algorithm (ECDSA)[R]. Waterloo:Dept. of C&O, University of Waterloo, 1999.
  • 8Nyberg K, Rueppel R A. A New Signature Scheme Based on the DSA Giving Message Recovery[A]. 1st ACM Conf. on Computer and Communication Security[C].New York:ACM Press, 1993.
  • 9[3]A.Menezes,T.Okamoto,S.Vanstone.Reducing elliptic curve logarithms to logarithms in a finite field.IEEE Transactions on Information Theory,1993,volume39,Pages 1639-1646.
  • 10[4]N.Smart.Announccment of an attack on the ECDLP for anomalous elliptic curves,1997.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部