Chebyshev多项式在公钥密码中的应用
[Abstract]:With the rapid development of communication technology, the application of public key cryptosystem in the fields of politics, economy, military and so on is becoming more and more popular, and the security of public key cryptosystem has been paid more and more attention. In this paper, several public-key cryptosystems based on Chebyshev polynomials are studied, and the security of cryptosystems is demonstrated by using the provable security idea. It is pointed out that the security of Chebyshev public key cryptosystem over finite fields is equivalent to the solution of discrete logarithm in some cases, and in some cases the iterative definition of Chebyshev public key cryptosystem is higher than that of solving discrete logarithm. Chebyshev polynomials can be regarded as a sequence of linear shift registers. Using this property, the period of Chebyshev polynomials over finite fields is studied in this paper, and the effect of period on the security of cryptosystems is analyzed in detail. Some suggestions are put forward for the selection of parameters: in the case of module P, there should be a large prime factor for P-1 and P1 respectively, which can effectively avoid the effect of small period on the security of cryptosystem. The advantages and disadvantages of three kinds of Chebyshev public key cryptosystems over finite fields and finite rings are compared. The fast algorithm of Chebyshev public key cryptosystems over finite rings is given by using Sun Tzu Theorem and the property of periodicity. This fast algorithm greatly reduces bit operation, and allows parallel computation. The increase of computing speed is very obvious. RSA. Lucas and Chebyshev public key cryptosystems are all applications of Dickson polynomials. In this paper, we study the periodicity of Chebyshev polynomials to compare their periods. The security of these cryptosystems is analyzed from the point of view of periodicity, and some suggestions on the selection of parameters are put forward. Through the research of periodicity, it is pointed out that cyclic attack is essentially a small period attack, and a more efficient attack is proposed for RSA like public-key cryptosystem. Cyclic attacks require repeated power operations on ciphertext, which requires multiple multiplications of the ciphertext itself. In order to resist the cyclic attack, the N=pq in N=pq system should satisfy p-1 and g-1 with a large prime factor. In this paper, we give a simple proof combining with the properties of Euler function.
【学位授予单位】:中南大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.1;O174.14
【共引文献】
相关期刊论文 前10条
1 姜楠;金英善;崔晓锋;刘波;李禾;;基于RSA算法的文件加密系统设计[J];大连民族学院学报;2013年05期
2 高卫斌;;云数据安全问题与对策的研究[J];信息安全与技术;2013年11期
3 肖建飞;;“E商贸通”在电子商务中的应用和实现[J];电脑知识与技术;2013年36期
4 宋长军;白永祥;;椭圆曲线及其在密码学中的应用研究[J];电脑知识与技术;2013年34期
5 郭晓;李鉴增;;基于移动终端的数字电视机条件接收方案研究[J];中国传媒大学学报(自然科学版);2014年02期
6 李拴保;杨凤霞;;基于身份的数字签名综述[J];河南财政税务高等专科学校学报;2014年02期
7 王秋华;吕秋云;王小军;骆懿;游林;;无线传感器网络中一种新的无条件安全密钥协商模型[J];传感技术学报;2014年06期
8 王田;崔小欣;廖凯;廖楠;黄颖;张潇;于敦山;;RSA加密中基于二次Booth编码的Montgomery乘法器(英文)[J];北京大学学报(自然科学版);2014年04期
9 罗江洲;;具有附加性质的数字签名发展现状[J];电脑知识与技术;2014年21期
10 陶建平;;一个基于ECC的可证安全的多代理签名方案[J];公安海警高等专科学校学报;2009年03期
相关博士学位论文 前10条
1 肖攸安;网络信息安全中的椭圆曲线公钥密码体系的研究[D];武汉理工大学;2003年
2 孔凡玉;公钥密码体制中的若干算法研究[D];山东大学;2006年
3 韦卫;Internet网络安全的若干理论研究与安全Web系统的设计实现[D];中国科学院研究生院(计算技术研究所);1999年
4 孙跃刚;椭圆曲线密码体制中若干问题的研究[D];吉林大学;2009年
5 李智慧;基于Lucas序列的公钥密码体制的研究[D];北京邮电大学;2012年
6 孙昌霞;基于属性的数字签名算法设计与分析[D];西安电子科技大学;2013年
7 崔翰川;面向共享的矢量地理数据安全关键技术研究[D];南京师范大学;2013年
8 游伟;基于单圈T-函数导出序列的构造与分析[D];解放军信息工程大学;2013年
9 杨易e,
本文编号:2145860
本文链接:https://www.wllwen.com/jingjilunwen/zhengzhijingjixuelunwen/2145860.html