节点文献
椭圆曲线密码及其在电子商务中的应用
Elliptic Curve Cryptosystem’s Implementation and Application in the Electronic Business
【作者】 张勇;
【导师】 漆涛;
【作者基本信息】 北京邮电大学 , 计算机科学与技术, 2006, 硕士
【摘要】 随着计算机和通信网络技术的进步,电子商务日益蓬勃发展。电子商务的安全性是其研究和实施的关键问题。而随着椭圆曲线密码研究的深入和技术的逐渐成熟,其优点越来越突出,因此电子商务的主流协议之一—安全电子交易SET已经把椭圆曲线密码作为下一代协议默认的公钥密码体制。但是SET并没有规定使用何种具体的椭圆曲线密码算法,而且目前基于椭圆曲线的密码算法很多,所以如何设计或者选择合适的椭圆曲线密码算法对于基于SET协议的电子商务系统的安全性实现来说有着十分重要的意义。 本文主要研究椭圆曲线密码在基于SET协议的电子商务中的应用。全文分四章:第一章简要介绍了有关的课题背景和作者完成的主要工作;第二章主要介绍了椭圆曲线密码的基本原理,包括密码学中使用的椭圆曲线点群的定义、基于椭圆曲线的公钥密码协议和已知的对椭圆曲线密码安全性的攻击;第三章详细探讨了椭圆曲线密码系统的具体实现问题,包括系统参数的选择、有限域运算、各种标量乘算法以及密钥管理、加解密和数字签名等椭圆曲线公钥密码协议;第四章介绍了电子商务的发展情况、电子商务的安全体系结构以及SET交易支付流程的三个主要阶段、分析了SET协议中公钥密码算法的应用情况,提出了自己的椭圆曲线密码加密方案。 本文的主要工作包括:(1)在深入讨论椭圆曲线密码基本原理和
【Abstract】 With the development of computer science and telecommunication networks technology, the electronic commerce has become more and more thriving in the past decade, while the security of an electronic commerce system is the key issue. As the researches on the elliptic curve cryptology go further and further, the technologies on it also become increasingly sophisticated. Due to the evident advantages of it, elliptic curve cryptology has been adopted as the default public key cryptosystem in the next Secure Electronic Transaction(SET). There are many elliptic curve cryptography algorithms by far and no definite ones are recommended in the next SET, so the research on how to apply elliptic curve cryptography to the SET means a lot to the development of an electronic commerce system based on the SET.The research in this dissertation is mainly about the application of elliptic curve cryptography in electronic commerce systems based on the SET. The dissertation consists of four chapters. In Chapter One, the relative background and what the research has been done are briefly introduced; in Chapter Two, the main principles about elliptic curve cryptography are involved, including the definition of the elliptic curve used in cryptography, the public key cryptography protocols based on elliptic curve and the known attack to elliptic curve cryptography; in Chapter Three, the implementation issues on the elliptic curve cryptosystem are discussed, including the selection of system’s parameters, the arithmetic and modular algorithms on a finite field, the elliptic curve algorithms, and the encryption/decryption and the signature/verification algorithms; the development of the electronic commerce, the security framework and the SET procedure are introduced in Chapter Four, and the researcher presented an elliptic curve encryption/decryption scheme here, based on the analysis of the application of public key cryptography in the SET.What the researcher has done in the dissertation includes: (1) implemented an elliptic curve cryptosystem; (2) tested the main point multiplication algorithms’ performances in a specific environment; (3) presented a practical method for the keys generation about the ECIES in the IEEE P1363 standard and implemented it; (4) presented an encryption/decryption scheme based on modified ECIES in the SET and analyzed the performance of it. The discussion on the implementation of an elliptic curve cryptosystem and the tested data on the performance of main point multiplication algorithms will benefit those who want to implement such a system, and the method for the keys generation about the ECIES in the IEEE P1363 standard as well as the scheme in the SET based on it not only can be implemented easily and universally, but also has the assured security, which means good application to the electronic commerce systems based on the SET.
【Key words】 elliptic curve cryptography; electronic commerce; SET; integrated encryption scheme;
- 【网络出版投稿人】 北京邮电大学 【网络出版年期】2006年 11期
- 【分类号】TN918
- 【被引频次】6
- 【下载频次】353