期刊文献+

用分布式并行算法选取GF〔p〕上椭圆曲线的基点 被引量:3

Selection of Base Point of Elliptic Curve over GF(P) Using Distributed Parallel Arithmetic
下载PDF
导出
摘要 椭圆曲线密码体制 (ECC)的研究与实现已逐渐成为公密码体制研究的主流 ,适用于密码的安全椭圆曲线及其基点的选取 ,是椭圆曲线密码实现的基础 ,而高效性是椭圆曲线密码系统得以广泛应用的重要因素。该文首先介绍有限域上定义的椭圆曲线及点群运算规则 ,给出椭圆曲线点群的阶。其次 ,就大素数域上安全椭圆曲线的基点的选取算法作了讨论 ,采用分布式并行算法 ,进一步改进优化 ,并借助于MIRACL系统利用标准C语言对它们成功实现 .实际测试结果表明 ,该工作确实加快了安全椭圆曲线基点的选取。 The study and realization of elliptic curve cryptography have become the mainstream of the study on public cryptography ,and the selection of secure elliptic curves in cipher and their base points is the basis of implementing the elliptic curve cryptography.But high efficiency is the important factor to make the elliptic curve cryptosystem widely used. This paper ,firstly introduces the elliptic curve in finite field and algebraic law of its point group,gives the order of the group.Secondly the selection algorithm of the base point about secure elliptic curves over large prime number is discussed, and optimized resorting to distributed parallel algorithm,futher more the algorithm is implemented successfully in C language using the MIRACL system.The actual test results indicate that our work really enhances the selection efficiency of the base point about secure elliptic curves.
作者 张金山
出处 《计算机仿真》 CSCD 2004年第4期54-55,共2页 Computer Simulation
关键词 分布式并行算法 基点 ECC 公开密钥密码体制 椭圆曲线密码系统 Elliptic curve Parallel arithmetic Base point Implementation
  • 相关文献

参考文献7

二级参考文献14

  • 1何大可.LUC公钥密码体制及其特性.密码学进展--CHINACRYPT'94[M].北京:科学出版社,1994..
  • 2舒继武.大规模油藏并行数值模拟研究[M].南京:南京大学计算机系,1998..
  • 3[2]V.Miller,Uses of elliptic curves in cryptography,Advances in Cryptology-CRYPTO' 85.LNCS218,Santa Barbara,Calif.,Springer-Verlag,1986,417-426.
  • 4[3]Multiprecision Integer and Rational Arithmetic C/C++ Library(MIRCAL),available at http://indigo.ie/~msoott/.
  • 5[4]A.Menezes,T.Okamnoto,S.Vanstone,Reducing elliptic curve logarithms to logarithms in a finitoe field.IEEE Trans.on Information Theory,1993,39(5),1639-1646.
  • 6[5]N.Koblitz,A Course in Number Theory and Cryptogralphy,2nd e7ition.Spring-Verlag.1994.Ch.6.
  • 7[6]N.Koblitz,Algebraic Aspects of Cryptography,Algorithms and Computation in Math.Editors:E.Becker,M.Bronstein,H.Cohen,3(1998),Berlin Heidelberg,Springer-Verlag,1998,Ch.6.
  • 8[7]IEEE P1363,Standard Specifications for Public-Key Cryptography,Ballot Draft.1999,Drafts available at http://indigo,ie/~msoott/.
  • 9[8]R.Schoof,Elliptic curves over finite fields and the computation of square roots modp.Math.Comp.,1985,44(170),483-494.
  • 10[9].T.Izu,J.kogure,M.Noro,K.Yokoyama,Efficient Implementation of Sehoof's Algorithm.Asi acrypt'98,Berlin Heidelberg,Springer-Verlag,1998,66-79.

共引文献40

同被引文献26

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部