期刊文献+

ECC算法在软件保护中的应用及安全性分析 被引量:4

Application and Security Analysis of ECC Algorithm in Software Protection
下载PDF
导出
摘要 椭圆曲线密码体制基于其长度小、安全性高等特点在公钥密码系统中得到广泛应用,其安全性是基于椭圆曲线上的离散对数的难解性,它还依赖于椭圆曲线的选择。建立椭圆曲线密码体制的首要问题之一就是产生能够抵抗已有算法攻击的安全的椭圆曲线。文中主要将ECC加密技术应用于注册码软件加密保护方案中,对其进行了抗密码分析能力的讨论,最后对ECC算法的安全性进行研究及分析。因此,基于其极强的安全性ECC加密技术将会广泛地被应用。 Elliptic curve cryptosystem based on its shorter length,high security features in the public key cipher system is widely used, its security is based on the elliptic curve discrete logarithm abstruse, it also depends on the selection of elliptic curve. Establishment of elliptic curve cryptography is one of the most important problems is to produce secure elliptic curve can resist the attack of existing algorithms. The ECC encryption technology is applied to the register code software encryption and protection scheme, the cryptanalysis-resisting ca- pacity is discussed, finally the ECC algorithm security is researched and analysed. Therefore, based on its strong security ECC encryption technology will be widely applied.
出处 《计算机技术与发展》 2012年第8期155-158,共4页 Computer Technology and Development
基金 陕西省教育科技项目(2010JK904)
关键词 椭圆曲线密码体制 安全性 注册码 离散对数 elliptic curve cryptography security license discrete logarithm
  • 相关文献

参考文献12

二级参考文献28

  • 1李道丰,揭全良.基于椭圆曲线的数字有序多签名方案[J].通讯和计算机(中英文版),2005,2(2):34-38. 被引量:4
  • 2[1]Caelli W J, Dawson E P Elliptic Curve Cryptography and Digital Signatures.Computers & Security, 1999(18)
  • 3[2]Menezes A,Van O P,Vanstone S Handbook of Applied Cryptography. CRC Press, 1996
  • 4[3]Escott A E,Sager J C.Attacking Elliptic Curve Cryptosystems Using the Parallel Pollard′s rho Method. RSA Laboratorics′s CryptoBytes.1999,14(2)
  • 5[2]Pohlig S, Hellman M. An Improved Algorithm of Computing Logarithms Over GF(p) and Its Cryptographic Significance. IEEE Trans on Information Theory, 1978; 24(1): 106 - 110
  • 6[4]Menezes A, Okamoto T, Vanstone S. Reducing Elliptic Curve Loga rithms to Logarithms in a Finite Field. IEEE Trans on Information Theory, 1993; 39(2): 1639 ~ 1646
  • 7Lopez J,Dahab R.An overview of elliptic curve cryptography[EB/OL].http://cnscenter.future.co.kr/crypto/algorithm/ecc.html2002,10/2003-9-3.
  • 8Baier H.Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography[EB/OL].http://cnscenter.future.co.kr/crypto/algorithm/ecc.html,2003-9-3.
  • 9Erkay S,Thomas A Schmidt.Generating elliptic curves of prime order[C].Berlin:Springer-Verlag,2001.
  • 10Miller V.Uses of elliptic curves in cryptography[A].Advances in Cryptology Crypto'85[C].Berling:Spring Verlag,1986.417-426.

共引文献102

同被引文献30

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部