Public Key Cryptosystem Research Based on Discrete Group

Article Preview

Abstract:

In modern society with Internet rapid development, information system takes digital form of 0 and 1, this information system and public channel are very fragile in the case of without defensive measures, and they are easily attacked and destructed by hackers and intruders. This article is mainly based on the knowledge of discrete logarithm, studies public key cipher algorithm, especially elliptic curve cryptosystem. First this paper introduces the basic concepts and knowledge of cryptography, and discusses the relation between discrete logarithm and public key cryptography algorithms. Finally in detail it discusses elliptic curve cryptosystem, and presents the realization and running effect of encryption system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2984-2988

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] DouglasR Stinson. Cryptography theory and practice. Electronic Industry Press.

Google Scholar

[2] Cormen, T.H. Introduction to Algorithms, Mechanical Industry Publishing House.

Google Scholar

[3] Andreas Enge. Elliptic curve and its application in cryptography - guide. Science Press.

Google Scholar

[4] Wenbo Mao. The theory and practice of modern cryptography. Electronic Industry Press.

Google Scholar

[5] Kaiquan Shi, Yoping Huang. A Public Cryptosystem -based on the Generated Data in Extension Set [J], IEEE, 2001 (1) : 18 to 23.

Google Scholar

[6] Hu Xiangdong, Wei Qinfang. Applied cryptography. Electronic Industry Press.

Google Scholar