共查询到19条相似文献,搜索用时 125 毫秒
1.
2.
本文讨论几种超椭圆曲线密码体制,详细介绍超椭圆曲线群规律的实现和产生适用于密码的曲线的方法,本文专门对椭圆曲线数字签名方案和超椭圆曲线方案的性能进行了比较。结论是,目前没有任何超椭圆曲线的性能优于椭圆曲线 相似文献
3.
椭圆曲线密码体制相关问题 总被引:3,自引:0,他引:3
椭圆曲线密码体制是近年来密码学理论与应用研究的一个热点。介绍了椭圆曲线密码体制的数学原理、应用和攻击现状,重点分析了对一般曲线的各种攻击方法,针对超奇异椭圆曲线的MOV攻击,对异常椭圆曲线的SS-SA攻击。并介绍了目前较为关注的超椭圆曲线。 相似文献
4.
超椭圆曲线密码体制(HECC)是以超椭圆曲线离散对数问题的难解性为基础的,相对于其他密码体制而言,具有安全性高、操作数短等优点。文中设计了一种基于超椭圆曲线密码体制的盲数字签名方案,方案中提出了对消息盲化的方法。该方案具有很高的安全性,非法用户很难通过截获的消息来获取明消息,因为盲化是建立在离散对数问题上的。 相似文献
5.
6.
SET协议是电子商务中最为重要的安全协议之一,其关键技术有数据加解密技术、数字签名、数字信封、CA数字证书技术。这些技术的实现均以RSA公钥密码体制为基础。文中首先分析了RSA密码体制的基本原理,然后研究了RSA密码体制在SET协议中的应用。 相似文献
7.
椭圆曲线密码体制已经成为密码学的研究热点之一.相对于其它公钥密码体制,椭圆曲线密码体制有短密钥和计算效率高等优点.本文介绍椭圆曲线密码体制及其在加密和数字签名等方面的应用,并讨论了椭圆曲线密码体制的安全性. 相似文献
8.
ECC密码技术及其优越性 总被引:7,自引:0,他引:7
椭圆曲线密码体制是近年来兴起的一种性能优良的公钥密码体制,本文介绍了椭圆曲线密码体制的有关概念和基本理论,将它与其它公钥密码体制进行了比较,阐述了椭圆曲线密码体制的优越性。 相似文献
9.
10.
11.
Flexible Prime‐Field Genus 2 Hyperelliptic Curve Cryptography Processor with Low Power Consumption and Uniform Power Draw
下载免费PDF全文
![点击此处可从《ETRI Journal》网站下载免费的PDF全文](/ch/ext_images/free.gif)
This paper presents an energy‐efficient (low power) prime‐field hyperelliptic curve cryptography (HECC) processor with uniform power draw. The HECC processor performs divisor scalar multiplication on the Jacobian of genus 2 hyperelliptic curves defined over prime fields for arbitrary field and curve parameters. It supports the most frequent case of divisor doubling and addition. The optimized implementation, which is synthesized in a 0.13 μm standard CMOS technology, performs an 81‐bit divisor multiplication in 503 ms consuming only 6.55 μJ of energy (average power consumption is 12.76 μW). In addition, we present a technique to make the power consumption of the HECC processor more uniform and lower the peaks of its power consumption. 相似文献
12.
This paper presents the design and implementation of a hyperelliptic curve cryptography (HECC) coprocessor over affine and projective coordinates, along with measurements of its performance, hardware complexity, and power consumption. We applied several design techniques, including parallelism, pipelining, and loop unrolling, in designing field arithmetic units, group operation units, and scalar multiplication units to improve the performance and power consumption. Our affine and projective coordinate‐based HECC processors execute in 0.436 ms and 0.531 ms, respectively, based on the underlying field GF(289). These results are about five times faster than those for previous hardware implementations and at least 13 times better in terms of area‐time products. Further results suggest that neither case is superior to the other when considering the hardware complexity and performance. The characteristics of our proposed HECC coprocessor show that it is applicable to high‐speed network applications as well as resource‐constrained environments, such as PDAs, smart cards, and so on. 相似文献
13.
14.
概要介绍了数据加密的一些经典方法,重点介绍了数据加密技术中的DES和RSA算法,并以此为基础讨论电子商务安全技术中的SET协议,对数字签名、数字信封和双重签名进行了讨论. 相似文献
15.
16.
研究了移动AdHoc网络(MANET)按需路由协议的安全问题,分析了现有的安全改进方案的优缺点.以一种基于椭圆曲线密码体制的高效数字签名算法为基础,提出一种适合按需路由协议的安全性改进方法,对其执行效率和安全性进行了分析,并在QualNet仿真平台下对应用该方法改进的AODV协议进行验证.仿真过程实现了真实的安全算法,针对blackholes和rushing两种常见攻击分别构建了攻击模型,结果表明改进后协议以很小的延时和协议开销代价得到了较高的安全性. 相似文献
17.
18.
Lotspiech J. Nusser S. Pestoni F. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2004,92(6):898-909
Broadcast encryption is an active area of cryptographic research. Originally defined by Fiat and Naor, broadcast encryption refers to key management schemes that operate when the participating parties do not have a two-way communication path. We contrast that with public-key cryptography: all known public-key protocols require a handshake to establish a common key. We extend the use of broadcast encryption to solve problems that have been traditionally addressed by public-key cryptography: we discuss the xCP cluster protocol, a proposed digital rights management (DRM) system for the home entertainment network, and we illustrate a broadcast-encryption-based content distribution system, which can work without requiring any secrets in the DRM client. 相似文献
19.
Verifying the SET registration protocols 总被引:6,自引:0,他引:6
Bella G. Massacci F. Paulson L.C. 《Selected Areas in Communications, IEEE Journal on》2003,21(1):77-87
Secure electronic transaction (SET) is an immense e-commerce protocol designed to improve the security of credit card purchases. In this paper, we focus on the initial bootstrapping phases of SET, whose objective is the registration of cardholders and merchants with a SET certificate authority. The aim of registration is twofold: getting the approval of the cardholder's or merchant's bank and replacing traditional credit card numbers with electronic credentials that cardholders can present to the merchant so that their privacy is protected. These registration subprotocols present a number of challenges to current formal verification methods. First, they do not assume that each agent knows the public keys of the other agents. Key distribution is one of the protocols' tasks. Second, SET uses complex encryption primitives (digital envelopes) which introduce dependency chains: the loss of one secret key can lead to potentially unlimited losses. Building upon our previous work, we have been able to model and formally verify SETs registration with the inductive method in Isabelle/HOL (T. Nipkow et al., 2002). We have solved its challenges with very general techniques. 相似文献