毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc

上传人:管** 文档编号:850530 上传时间:2023-09-15 格式:DOC 页数:15 大小:73KB
下载 相关 举报
毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc_第1页
第1页 / 共15页
毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc_第2页
第2页 / 共15页
毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc_第3页
第3页 / 共15页
毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc_第4页
第4页 / 共15页
毕业论文外文翻译--基于RSA的数字签名系统的设计与实现(适用于毕业论文外文翻译+中英文对照.doc_第5页
第5页 / 共15页
点击查看更多>>
资源描述

1、外文翻译系 别信息工程系专 业网络工程班 级学 号17姓 名指导教师负责教师沈阳航空航天大学北方科技学院2012年6月沈阳航空航天大学北方科技学院毕业设计(外文翻译)The Design and Realization of Digital Signature Based on RSARSA algorithms is introducedRSA public key cryptography. So-called public key cryptography system is to use different encryption and decryption key keys, is

2、a known encryption key is deduced by declassified in calculations is key to be done password system.In a public-key cryptosystem, encryption key (i.e. public key) PK is the public information, and decryption key (namely, the private key) SK is needed to remain confidential. Encryption algorithm E an

3、d decryption algorithm D also are in the open. Although the secret key SK is by public key PK decision, but cannot PK calculated according to SK. It is based on this theory, appeared in 1978 the famous RSA algorithms, it is usually into a pair of Mr RSA keys, one of which is kept secret key, save by

4、 users; Another for public key, can be made public, and even can be registered in the network server. In order to improve the secrecy intensity, RSA keys at least 500 bits long, generally recommend using 1024 bits. This makes the calculation amount of encryption is very large. To reduce the computat

5、ional complexity, sending the information, often USES traditional encryption methods and public key encryption method unifies means, that information with the improved DES or IDEA dialogue key encryption, and use the RSA encryption keys and information the dialogue. Each other after receiving inform

6、ation, with different keys decryption and can check the information.RSA algorithms is the first not only can be used for encryption but also can be used for digital signature algorithm, and it is also easy to understand and operation. RSA is most widely studied public key algorithm, and put forward

7、to the now from more than 30 years, experienced the test of all kinds of attacks, for the people to accept gradually, generally, is now one of the most outstanding public key solutions.The safety of the RSARSA security depends on the larger decomposition, but whether or not equal to tarsus decomposi

8、tion theory has been failed to get the certificate, and for no proof that break RSA will need to be larger decomposition. Assuming there are a large without decomposition algorithm, it must be larger decomposition algorithm can be modified. At present, some variant of RSA algorithms have been proved

9、 equivalent to tarsus decomposition. Anyway, the decomposition n is the most obviously method of assault. Now, people already can break down more than 140 decimal big primes. Therefore, must choose a big modulus n some, for application is up.RSA speedBecause of the large is calculated, make the fast

10、est RSA than DES 100 times on slow, whether software or hardware implementation. Speed has been the defects of RSA. Generally speaking only for a few data encryption.RSAs chosen-ciphertext attackRSA in chosen-ciphertext before the attack is weak. Generally the attacker is will certain information is

11、 the camouflage (Blind), let the private key with the entity to sign. Then, after calculation can get what it wanted information. In fact, attack the same weaknesses are using, that is such a fact that have been retained the multiplication of the input structure: (XM) d = X d * M d mod n front have

12、already mentioned, the inherent problems from the public key cryptography is the most useful features-everyone can use public key. But from the algorithm cant solve the problem, the main measures are two: one is the good public key agreement, guarantee the process not produce any other entity entity

13、 of the information the decryption, you know nothing wrong information signature; The other One is never sent to strangers random document signature, the first to use One sign of a document for-Way HashFunction HASH processing, or use at the same time different signature algorithm.RSA encryption alg

14、orithm faults produce key is very troublesome, produced by a prime technical limitations, so hard to do it once a secret. security, the safety of RSA depends on the large factor decomposition, but did not prove theoretically decipher the difficulty of tarsus and RSA decomposition difficulty equivale

15、nt, and most people tend to academic password factor decomposition is not NPC problem. At present, people already can break down more than 140 decimal big primes, it is required to use more long key, speed, more slowly; Moreover, the people are actively looking for attack RSA methods, such as chosen

16、-ciphertext attack, general attackers will certain information is the camouflage (Blind), let the private key with the entity to sign. Then, after calculation can get what it wanted information. In fact, attack the same weaknesses are using, that is such a fact that have been retained the multiplica

17、tion of the input structure: (XM) d = Xd * Md mod n front have already mentioned, the inherent problems from the public key cryptography is the most useful features-everyone can use public key. But from the algorithm cant solve the problem, the main measures are two: one is the good public key agree

18、ment, guarantee the process not produce any other entity entity of the information the decryption, you know nothing wrong information signature; The other One is never sent to strangers random document signature, the first to use One sign-Way Hash Function of document for Hash processing, or use at

19、the same time different signature algorithm. In addition to using public modulus, people also try some use decryption index or (n) and so on attack. speed too slow, because the grouping of RSA too large length, to ensure safety, n at least 600 bitx above, make the operation cost is high, especially

20、at a slower speed, a symmetric cryptosystem several orders of magnitude slower; Along with the development of the larger decomposition technique, the length is increasing, go against the standardization of data format. At present, the SET (Secure Electronic Transaction) agreement with 2048 bits long

21、 requirements CA keys, other entity USES 1024 bit key. In order to speed, at present the widely use of single, the method of using a combination of public key password, complementary advantages and disadvantages: ChanYao password encryption speed, people use it to encrypt a long documents, and then

22、using the RSA encryption to give document, extremely good solve the problem of ChanYao password key distribution.Modern cryptography has become the core of information security technology, cryptography, is the communication security confidential subject research, that is, to study the type of secret

23、 information transmission of transformation in order to prevent the third party to steal information. Cryptography include two branches: password code to learn and password analytics. Password code to learn the main information exchange, to protect information in the channels relay in to steal, decr

24、yption and use method, and the password analysis learning is and password code learning instead, it mainly studies how to analyze and crack password. Both between both opposition to each other and promote each other. The classification of the password system has a lot of, one of them is based on enc

25、ryption algorithm and decryption keys used algorithms are same, password system can be divided into symmetrical encryption system (ChanYao password system) and asymmetric encryption system (public key cryptosystems), the two password system each have their own advantages and disadvantages, so now US

26、ES two hybrid. Public key cryptosystems features are: the receiving party B produces a pair of keys (PK and SK); PK public, SK confidential; PK from launch SK is very difficult; A and B both sides communication, A in any way obtained B public key, use the B public key encryption information, encrypt

27、ed information can be obtained by any unsafe channel sent. B received ciphertext information, with their own private key recovering the decryption plaintext. Public key cryptography system to ensure the security of information have become the key technology. RSA public key cryptosystems so far or a

28、recognised as safe system. RSA public key encryption algorithm is the first can used for data encryption can also be used as a digital signature algorithm. It is easy to understand and operation, is also very popular. As more commercial application and standardization work, RSA has become the most r

29、epresentative of the public key encryption technology. VISA, MasterCard, IBM, Microsoft and other companies for the safety of Electronic trading work standard (Secure Electronic Transactions, SET) adopt the standard RSA algorithms, this makes the RSA in our life almost everywhere. Online transaction

30、s encrypted connection, the bank on the net identity authentication, all kinds of credit card the use of digital certificate, intelligent mobile phone memory card and validation of chips and so on the function, most use RSA technology.In 1995, has been put forward a very unexpected attack way: if E

31、younger sister to huang hardware are fully know, and know it to some specific message when the time needed to encrypt words, so she can be quickly is deduced from the d. This attack will be established the way, mainly because of the encryption on the mode of the index when computing is a bit a bit,

32、and bits of 1 spent than a yuan for 0 computation of a operation, so if you can get more information and its encryption of time, will have a chance to launch the private key content. The most popular attack on RSA is generally larger factor decomposition based on. In 1999, the RSA-155 (512 bits) be

33、successful decomposition, spent five months time (about 8000 MIPS years) and 224 CPU hours in a 3.2 G the central memory Cray C916 finished on the computer. In 2002, the RSA-158 was also success factor decomposition. On December 12, 2009, Numbers for RSA-768 (768 bits, 232 digits) number also be suc

34、cessful decomposition. Beijing time February 15 morning news, according to the New York times reported Tuesday, European and American mathematicians and cryptographers accidental discovery, at present is widely spoken all over the worlds public key encryption algorithm RSA existence of loopholes. Th

35、ey found that, in 7 million the experiment of 27000 sample public key and not according to the theory of randomly generated. That is, maybe someone can find out the secret of produce public key prime Numbers. This research project was made by the independent cryptographers James P.H ughes and Dutch

36、mathematician Arjen k. Lenstra lead. Their report said: we found the vast majority of the public key all is according to the theory of generation, but every one thousand public key will have two unsafe. The report says, to prevent someone USES the vulnerability, a public key from the public access d

37、atabase has been removed. To ensure the security of the system, the website needs to be in the terminal to change.Over the years, RSA mainly focuses on information security market in several fields, is also have distinguishing feature each field. In the identity authentication field, RSA attention t

38、o many online trading enterprise including financial, search, and industry, the user to the extent of the identity authentication concern obviously different. Another fishing, Trojan than before more widespread. Online identity authentication, the growth is strong fraud. In addition, the enterprise

39、internal control, at present, China is still in the process of maturity. In the data leak in some new Trojan RSA services to society and to the strong identity authentication, also have some new business breakthrough.The financial industry in anywhere in the world, there are the highest safety risk

40、industry, whether the reality of crime or cyber crime, financial is a sweet BoBo. Along with the development of the network bank, financial industry to information security solutions needs always very strong, the financial industry is the largest RSA development space, and in the future for a period

41、 of time will still is. How to keep the financial industry information security, prevent data leak, and deal with the financial services, and become the focus of future business development RSA.Digital signature is introducedDigital signature, is the only information to produce the sender of the oth

42、ers cant fake a digital string, the string is also a number of information of the sender sends information a valid proof of authenticity.Digital signature is symmetrical encryption technology and the application of digital technology.Digital signature of the file is easy to verify the integrity of t

43、he (dont need at the chapter, at the signature, also do not need the handwriting expert), and digital signature is not deny sex (dont need the handwriting expert to verify).Say simply, the so-called digital signature is additional data unit in on some of the data, or of data elements of the password

44、 change. This kind of data or transform allow data unit receiver to confirm our units of data source and the units of data integrity and protect data, to prevent being (such as the receiver) forged. It is to the electronic form of news to sign one method, a signature news can be in a communication n

45、etwork transmission. Based on the public key cryptography system and a private key password system can get digital signature, mainly is based on public key cryptosystems digital signature. Including ordinary digital signatures and special digital signature. Ordinary digital signature algorithm has R

46、SA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm and finite automata digital signature algorithm, etc. Special digital signatures have blind signature, proxy signature, group signature, undenia

47、ble signature, fair blind signature, threshold signature, with news of the signature restore function, it is closely related with the specific application environment. Obviously, the application of digital signature involving legal problems, the federal government based on limited domain of discrete

48、 logarithm problem develop their own digital signature standard (DSS).Digital Signature (Digital Signature) technology is asymmetric encryption algorithm of typical application. The process of application of digital signature, sending data sources to use his private key to data validation and or oth

49、er relevant variables and data content to encrypt and the completion of legal signature data, data receiving party is use the other public key to interpret received digital signatures, and will interpret results are used to test the integrity of the data, to confirm the legitimacy of the signature. Digital signature technology in network system is virtual environment identified important technology, and can completely replace the real

展开阅读全文
相关资源
相关搜索
资源标签

当前位置:首页 > 学术论文 > 外文翻译(毕业设计)

版权声明:以上文章中所选用的图片及文字来源于网络以及用户投稿,由于未联系到知识产权人或未发现有关知识产权的登记,如有知识产权人并不愿意我们使用,如有侵权请立即联系:2622162128@qq.com ,我们立即下架或删除。

Copyright© 2022-2024 www.wodocx.com ,All Rights Reserved |陕ICP备19002583号-1 

陕公网安备 61072602000132号     违法和不良信息举报:0916-4228922