Improved Elliptic Encryption Algorithm

Article Preview

Abstract:

While the rapid development of Internet technology and communication technology, SSL VPN (security socket Layer Virtual Private Network) as a new remote access technology about network application layer, not only based on the proven SSL protocol, but meet the needs of most of network users. In recent years, enterprise networks have been widely used. However, due to its structure so that all access and calculation must be processed through VPN service, which appeared insufficient memory, computing speed to keep up with other issues. This article proposed some improvement based on these issues, using the improved algorithm to encrypt the ellipse. Keywords- SSL; VPN; Ellipse algorithm

You might also be interested in these eBooks

Info:

Periodical:

Pages:

741-746

Citation:

Online since:

August 2014

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zhong Cheng. Research on digital signature technology based on multi-elliptic curve cryptosystem [J]. University of Guangxi, 2003. 05.

Google Scholar

[2] Xiangdong Hu, Qinfang Wei. Applied Cryptography Tutorial [M]. Electronic Industry Press, (2005).

Google Scholar

[3] Jiaguang Sun. Computer Graphics [M]. Tsinghua University Press, (2004).

Google Scholar

[4] Jingdong Zhao. Oval generation algorithm, 2004, 26(8): p.56 – 59.

Google Scholar

[5] Yang Bo. Network Security Theory and Application [M]. Electronic Press 2002.

Google Scholar

[6] In Zhongda Xu, Xianghao Nan. Internet X. 509 PKI Secure communication protocol design and proof [N]. Computer Engineering and Applications Press (2003).

Google Scholar

[7] Qiuliang Xu, Daxing Li. Elliptic Curve Cryptography [J]. Computer Research and Development, Volume 36, No. 11.

Google Scholar

[8] Sutherland I. E Sketchpad: A Man Machine Graphical Communication System, AFIPS SICC V. 23 p.329 (1963).

DOI: 10.1145/1461551.1461591

Google Scholar

[9] Elliptic Curves over Finite Fields and the Computation of Square Roots mod p, Rene school.

Google Scholar

[10] Yurong Qin. Elliptic curve cryptography and its application [J]. Xi'an University of Electronic Science and Technology Master Thesis, (2002).

Google Scholar

[11] Rafael C. Gonzalez, Digital Image Processing Second Edition [M]. Addison-Wesley Publishing Company, 1987: 176-180.

Google Scholar

[12] Te-Hsiu Sun. K-Cosine Corner Detection [J]. Journal of Computer, 2008, 3 (7): 16-22.

Google Scholar