收藏 分销(赏)

毕业论文外文翻译基于RSA的数字签名系统的设计与实现.pdf

上传人:人****来 文档编号:3229236 上传时间:2024-06-26 格式:PDF 页数:14 大小:434.98KB
下载 相关 举报
毕业论文外文翻译基于RSA的数字签名系统的设计与实现.pdf_第1页
第1页 / 共14页
毕业论文外文翻译基于RSA的数字签名系统的设计与实现.pdf_第2页
第2页 / 共14页
毕业论文外文翻译基于RSA的数字签名系统的设计与实现.pdf_第3页
第3页 / 共14页
毕业论文外文翻译基于RSA的数字签名系统的设计与实现.pdf_第4页
第4页 / 共14页
毕业论文外文翻译基于RSA的数字签名系统的设计与实现.pdf_第5页
第5页 / 共14页
点击查看更多>>
资源描述

1、1 The Design and Realization of Digital Signature Based on RSA RSA algorithms is introduced RSA public key cryptography.So-called public key cryptography system is to use different encryption and decryption key keys,is a known encryption key is deduced by declassified in calculations is key to be do

2、ne password system.In a public-key cryptosystem,encryption key(i.e.public key)PK is the public information,and decryption key(namely,the private key)SK is needed to remain confidential.Encryption algorithm E and decryption algorithm D also are in the open.Although the secret key SK is by public key

3、PK decision,but cannot PK calculated according to SK.It is based on this theory,appeared in 1978 the famous RSA algorithms,it is usually into a pair of Mr RSA keys,one of which is kept secret key,save by users;Another for public key,can be made public,and even can be registered in the network server

4、.In order to improve the secrecy intensity,RSA keys at least 500 bits long,generally recommend using 1024 bits.This makes the calculation amount of encryption is very large.To reduce the computational complexity,sending the information,often USES traditional encryption methods and public key encrypt

5、ion method unifies means,that information with the improved DES or IDEA dialogue key encryption,and use the RSA encryption keys and information the dialogue.Each other after receiving information,with different keys decryption and can check the information.RSA algorithms is the first not only can be

6、 used for encryption but also can be used for digital signature algorithm,and it is also easy to understand and operation.RSA is most widely studied public key algorithm,and put forward to the now from more than 30 years,experienced the test of all kinds of attacks,for the people to accept gradually

7、,generally,is now one of the most outstanding public key solutions.The safety of the RSA RSA security depends on the larger decomposition,but whether or not equal to tarsus decomposition theory has been failed to get the certificate,and for no proof that break RSA will need to be larger decompositio

8、n.Assuming there are a large without 2 decomposition algorithm,it must be larger decomposition algorithm can be modified.At present,some variant of RSA algorithms have been proved equivalent to tarsus decomposition.Anyway,the decomposition n is the most obviously method of assault.Now,people already

9、 can break down more than 140 decimal big primes.Therefore,must choose a big modulus n some,for application is up.RSA speed Because of the large is calculated,make the fastest RSA than DES 100 times on slow,whether software or hardware implementation.Speed has been the defects of RSA.Generally speak

10、ing only for a few data encryption.RSAs chosen-ciphertext attack RSA in chosen-ciphertext before the attack is weak.Generally the attacker is will certain information is the camouflage(Blind),let the private key with the entity to sign.Then,after calculation can get what it wanted information.In fac

11、t,attack the same weaknesses are using,that is such a fact that have been retained the multiplication of the input structure:(XM)d=X d*M d mod n front have already mentioned,the inherent problems from the public key cryptography is the most useful features-everyone can use public key.But from the al

12、gorithm cant solve the problem,the main measures are two:one is the good public key agreement,guarantee the process not produce any other entity entity of the information the decryption,you know nothing wrong information signature;The other One is never sent to strangers random document signature,th

13、e first to use One sign of a document for-Way HashFunction HASH processing,or use at the same time different signature algorithm.RSA encryption algorithm faults produce key is very troublesome,produced by a prime technical limitations,so hard to do it once a secret.security,the safety of RSA depends

14、 on the large factor decomposition,but did not prove theoretically decipher the difficulty of tarsus and RSA decomposition difficulty equivalent,and most people tend to academic password factor decomposition is not NPC problem.At present,people already can break down more than 140 decimal big primes

15、,it is required to use more long key,speed,more slowly;Moreover,the people are actively looking for attack RSA methods,such as chosen-ciphertext attack,general attackers will certain information is the camouflage(Blind),let the private key with the entity to sign.Then,after calculation can get what

16、it wanted information.In fact,3 attack the same weaknesses are using,that is such a fact that have been retained the multiplication of the input structure:(XM)d=Xd*Md mod n front have already mentioned,the inherent problems from the public key cryptography is the most useful features-everyone can us

17、e public key.But from the algorithm cant solve the problem,the main measures are two:one is the good public key agreement,guarantee the process not produce any other entity entity of the information the decryption,you know nothing wrong information signature;The other One is never sent to strangers

18、random document signature,the first to use One sign-Way Hash Function of document for Hash processing,or use at the same time different signature algorithm.In addition to using public modulus,people also try some use decryption index or (n)and so on attack.speed too slow,because the grouping of RSA

19、too large length,to ensure safety,n at least 600 bitx above,make the operation cost is high,especially at a slower speed,a symmetric cryptosystem several orders of magnitude slower;Along with the development of the larger decomposition technique,the length is increasing,go against the standardizatio

20、n of data format.At present,the SET(Secure Electronic Transaction)agreement with 2048 bits long requirements CA keys,other entity USES 1024 bit key.In order to speed,at present the widely use of single,the method of using a combination of public key password,complementary advantages and disadvantage

21、s:ChanYao password encryption speed,people use it to encrypt a long documents,and then using the RSA encryption to give document,extremely good solve the problem of ChanYao password key distribution.Modern cryptography has become the core of information security technology,cryptography,is the commun

22、ication security confidential subject research,that is,to study the type of secret information transmission of transformation in order to prevent the third party to steal information.Cryptography include two branches:password code to learn and password analytics.Password code to learn the main infor

23、mation exchange,to protect information in the channels relay in to steal,decryption and use method,and the password analysis learning is and password code learning instead,it mainly studies how to analyze and crack password.Both between both opposition to each other and promote each other.The classi

24、fication of the password system has a lot of,one of them is based on encryption algorithm and decryption keys used algorithms are same,password system can be divided into symmetrical encryption system(ChanYao password system)and asymmetric encryption system(public key cryptosystems),the two password

25、 system each 4 have their own advantages and disadvantages,so now USES two hybrid.Public key cryptosystems features are:the receiving party B produces a pair of keys(PK and SK);PK public,SK confidential;PK from launch SK is very difficult;A and B both sides communication,A in any way obtained B publ

26、ic key,use the B public key encryption information,encrypted information can be obtained by any unsafe channel sent.B received ciphertext information,with their own private key recovering the decryption plaintext.Public key cryptography system to ensure the security of information have become the ke

27、y technology.RSA public key cryptosystems so far or a recognised as safe system.RSA public key encryption algorithm is the first can used for data encryption can also be used as a digital signature algorithm.It is easy to understand and operation,is also very popular.As more commercial application a

28、nd standardization work,RSA has become the most representative of the public key encryption technology.VISA,MasterCard,IBM,Microsoft and other companies for the safety of Electronic trading work standard(Secure Electronic Transactions,SET)adopt the standard RSA algorithms,this makes the RSA in our l

29、ife almost everywhere.Online transactions encrypted connection,the bank on the net identity authentication,all kinds of credit card the use of digital certificate,intelligent mobile phone memory card and validation of chips and so on the function,most use RSA technology.In 1995,has been put forward

30、a very unexpected attack way:if E younger sister to huang hardware are fully know,and know it to some specific message when the time needed to encrypt words,so she can be quickly is deduced from the d.This attack will be established the way,mainly because of the encryption on the mode of the index w

31、hen computing is a bit a bit,and bits of 1 spent than a yuan for 0 computation of a operation,so if you can get more information and its encryption of time,will have a chance to launch the private key content.The most popular attack on RSA is generally larger factor decomposition based on.In 1999,th

32、e RSA-155(512 bits)be successful decomposition,spent five months time(about 8000 MIPS years)and 224 CPU hours in a 3.2 G the central memory Cray C916 finished on the computer.In 2002,the RSA-158 was also success factor decomposition.On December 12,2009,Numbers for RSA-768(768 bits,232 digits)number

33、also be successful decomposition.Beijing time February 15 morning news,according to the New York times reported Tuesday,European and American mathematicians and cryptographers accidental discovery,at present is widely spoken all 5 over the worlds public key encryption algorithm RSA existence of loop

34、holes.They found that,in 7 million the experiment of 27000 sample public key and not according to the theory of randomly generated.That is,maybe someone can find out the secret of produce public key prime Numbers.This research project was made by the independent cryptographers James P.H ughes and Du

35、tch mathematician Arjen k.Lenstra lead.Their report said:we found the vast majority of the public key all is according to the theory of generation,but every one thousand public key will have two unsafe.The report says,to prevent someone USES the vulnerability,a public key from the public access data

36、base has been removed.To ensure the security of the system,the website needs to be in the terminal to change.Over the years,RSA mainly focuses on information security market in several fields,is also have distinguishing feature each field.In the identity authentication field,RSA attention to many on

37、line trading enterprise including financial,search,and industry,the user to the extent of the identity authentication concern obviously different.Another fishing,Trojan than before more widespread.Online identity authentication,the growth is strong fraud.In addition,the enterprise internal control,a

38、t present,China is still in the process of maturity.In the data leak in some new Trojan RSA services to society and to the strong identity authentication,also have some new business breakthrough.The financial industry in anywhere in the world,there are the highest safety risk industry,whether the re

39、ality of crime or cyber crime,financial is a sweet BoBo.Along with the development of the network bank,financial industry to information security solutions needs always very strong,the financial industry is the largest RSA development space,and in the future for a period of time will still is.How to

40、 keep the financial industry information security,prevent data leak,and deal with the financial services,and become the focus of future business development RSA.Digital signature is introduced Digital signature,is the only information to produce the sender of the others cant fake a digital string,th

41、e string is also a number of information of the sender sends information a valid proof of authenticity.Digital signature is symmetrical encryption technology and the application of digital technology.Digital signature of the file is easy to verify the integrity of the(dont need at the 6 chapter,at t

42、he signature,also do not need the handwriting expert),and digital signature is not deny sex(dont need the handwriting expert to verify).Say simply,the so-called digital signature is additional data unit in on some of the data,or of data elements of the password change.This kind of data or transform

43、allow data unit receiver to confirm our units of data source and the units of data integrity and protect data,to prevent being(such as the receiver)forged.It is to the electronic form of news to sign one method,a signature news can be in a communication network transmission.Based on the public key c

44、ryptography system and a private key password system can get digital signature,mainly is based on public key cryptosystems digital signature.Including ordinary digital signatures and special digital signature.Ordinary digital signature algorithm has RSA,ElGamal,Fiat-Shamir,Guillou-Quisquarter,Schnor

45、r,Ong-Schnorr-Shamir digital signature algorithm,Des/DSA,elliptic curve digital signature algorithm and finite automata digital signature algorithm,etc.Special digital signatures have blind signature,proxy signature,group signature,undeniable signature,fair blind signature,threshold signature,with n

46、ews of the signature restore function,it is closely related with the specific application environment.Obviously,the application of digital signature involving legal problems,the federal government based on limited domain of discrete logarithm problem develop their own digital signature standard(DSS)

47、.Digital Signature(Digital Signature)technology is asymmetric encryption algorithm of typical application.The process of application of digital signature,sending data sources to use his private key to data validation and or other relevant variables and data content to encrypt and the completion of l

48、egal signature data,data receiving party is use the other public key to interpret received digital signatures,and will interpret results are used to test the integrity of the data,to confirm the legitimacy of the signature.Digital signature technology in network system is virtual environment identif

49、ied important technology,and can completely replace the reality in the process of holograph signs,in the technology and the law is guaranteed.In the application of digital signature,the senders public key can be easily get,but his private key requires strictly confidential.Digital signature function

50、 Ensure the integrity of the information transmission,the senders identity authentication,to prevent trade in deny happen.Digital signature technology is will the information with senders private key encryption,and the original transfer to the recipient 7 together.The receiver only in sending public

展开阅读全文
部分上传会员的收益排行 01、路***(¥15400+),02、曲****(¥15300+),
03、wei****016(¥13200+),04、大***流(¥12600+),
05、Fis****915(¥4200+),06、h****i(¥4100+),
07、Q**(¥3400+),08、自******点(¥2400+),
09、h*****x(¥1400+),10、c****e(¥1100+),
11、be*****ha(¥800+),12、13********8(¥800+)。
相似文档                                   自信AI助手自信AI助手
百度文库年卡

猜你喜欢                                   自信AI导航自信AI导航
搜索标签

当前位置:首页 > 学术论文 > 毕业论文/毕业设计

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服