期刊文献+

素数域上ECC加密算法的软件实现 被引量:1

SOFTWARE IMPLEMENTATION OF AN ECC ENCRYPTION ALGORITHM OVER PRIME FIELDS
下载PDF
导出
摘要 椭圆曲线密码是目前公认的每比特安全性最高的密码体制,它具有安全性高、速度快、密钥短、实现时所需占用资源少等优点,非常适合应用于银行结算、电子商务和通信等领域,因此研究椭圆曲线密码的实现有重要意义。首先讨论椭圆曲线密码基本理论,然后介绍安全椭圆曲线选取方法以及经典的ECC加密算法,最后在Core(TM)2 Duo CPU E7500 2.93GHz实验平台上用标准C语言对该算法进行实现,验证该加密算法的可行性。 The elliptic curve cryptography (ECC) is generally recognised at present as the most secure encryption system, which provides highest level of security strength-per-bit and has many advantages such as higher safety property, faster speed, shorter key lengths and fewer computational resources for implementation, and is very suitable for the sectors of bank settlement, e-commerce and communication. There- fore it is of significance to study the software implementation of ECC encryption algorithm. In this paper, we first introduce the basic theory of elliptic curve cryptography, and then describe the way to select a secure elliptic curve and the classic ECC eneryption algorithm. Finally, we implement this algorithm in C and the assembler on a Core(TM) 2 Duo CPU E7500 2.93GHz workstation, and testify the feasibility of it.
作者 刘磊
出处 《计算机应用与软件》 CSCD 北大核心 2012年第8期289-291,共3页 Computer Applications and Software
关键词 椭圆曲线密码体制 素数域 安全曲线 实现 Elliptic curve cryptosystem Prime fields Secure curve Implementation
  • 相关文献

参考文献5

  • 1Koblitz N. Elliptic curve cryptosystems [ J]. Math Comp, 1987,48 (177) :203 -209.
  • 2Miller V. Uses of elliptic curves in cryptography [ M ]. Advance in Cryptology-CRYPT085, Lecture Notes in Computer Science, 1985, 218, Springer-Vedag, 1986:417 -426.
  • 3Durrel Hankerson, Alfred Menezes, Scott Vanstone.椭圆曲线密码学导论(Guide to Elliptic Curve Cryptography)[M].张焕国,译.北京:电子工业出版社,2005:12-13.
  • 4祝跃飞,顾纯祥,裴定一.SEA算法的有效实现[J].软件学报,2002,13(6):1155-1161. 被引量:5
  • 5周建钦.ECC密码算法[EB/OL].2010.http://zhou63.ahut.edu.cn/.

二级参考文献16

  • 1ANSI X9.62-1998. The Elliptic Curve Digital Signature Algorithm (ECDSA). Public Key Cryptography for the Financial Service Industry, American Bankers Association, 1998.
  • 2ANSI X9.63-1999. Key Agreement and Key Transport Using Elliptic Curve Cryptography. Public Key Cryptography for the Financial Service Industry, American Bankers Association, 1999.
  • 3IEEE P1363. Standards for Public-Key Cryptography. Institute of Electricaland Electronics Engineers, 1999.
  • 4SEC1. Elliptic Curve Cryptography. Standards for Efficient Cryptography Group, 1999.
  • 5FIPS 186-2. Digital Signature Standard. Federal Information Processing Standards, 2000.
  • 6Schoof, R. Counting points on elliptic curves over finite fields. Journal of Theorie des Nombres de Bordeaux, 1995,7:219~254.
  • 7Atkin, A.O. The number of points on an elliptic curve modulo a prime. Series of e-mail to the NMBRTHRY mailing list, 1992.
  • 8Elkies, N.D. Elliptic and modular curves over finite fields and related computational issues. In: Buell, D.A., Teitelbaum, J.T., eds. Coputational Perspective on Number Theory. AMS/International Press, 1998. 21~76.
  • 9Couveignes, J.-M., Morain, F. Schoof's algorithm and isogeny cycles. In: Adleman, L.M., Huang, M.D., eds. ANTS-I. LNCS 877, Springer-Verlag, 1994. 43~5.
  • 10Lecier, R., Morain, F. Counting the number of points on elliptic curves over finite fields: strategy and performances. In: Guillou, L.C., Quisquater, J.J., eds. Proceedings of the EUROCRYPT'95. LNCS 921, Springer-Verlag, 1995. 79~94.

共引文献4

同被引文献12

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.
  • 2ChristofPaar,JanPelzl.深入浅出密码学-常用加密技术原理与应用[M].马小婷,译.北京:清华大学出版社,2012.
  • 3路而红.现代算法密码工程[M].北京:清华大学出版社,2012.
  • 4Guo P,Su L P,Ning L J,et al.Hybrid encryption algorithms in cloud computing[J].Information Technology Journal,2013,12(14):3015-3019.
  • 5Lu Xianhui,Li Bao,Jia Dingding.Related-key security for hybrid encryption[J].Lecture Notes in Computer Science,2014,8783:19-32.
  • 6Potgieter M J,Dyk B J V.Two hardware implementations of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field[C]//IEEE AFRICON,Africon Conference in Africa.Piscataway,N J:IEEE Press,2002,1:187-192.
  • 7周术洋,彭蔓蔓,肖小欢.一种基于动态思想的SMS4算法改进与实现[J].微电子学与计算机,2011,28(9):86-88. 被引量:5
  • 8罗江华.基于MD5与Base64的混合加密算法[J].计算机应用,2012,32(A01):47-49. 被引量:27
  • 9陈昂,李磊,陈静,张志鸿.云环境下LBS的对称和非对称混合加密方案[J].计算机应用与软件,2013,30(8):73-77. 被引量:2
  • 10曾萍,张历,胡荣磊,杨亚涛,刘培鹤.WSN中基于ECC的轻量级认证密钥协商协议[J].计算机工程与应用,2014,50(2):65-69. 被引量:9

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部