Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:skybey
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic curves.The hidden Markov models are introduced for designing the trace-vector computation algorithm to accelerate the search for elliptic curve (EC) base-points.We present a new algorithm for secure Koblitz EC generation based on evolutionary cryptography theory.The algorithm is tested by selecting a secure Koblitz EC over the field F(2 2000),with experiments showing that both the base field and base point of the secure curve generated exceed the parameter range for Koblitz curves recommended by NIST.The base fields generated go beyond 1900 bits,which is higher than the 571 bits recommended by NIST.We also find new secure curves in the range F(2 163)-F(2 571) recommended by NIST.We perform a detailed security analysis of those secure curves,showing that those we propose satisfy the same security criteria as NIST. Considering potential attacks from cloud-computing and quantum-computing, it is becoming nec-essary to provide higher security elliptic curves. The hidden Markov models are introduced to designing the trace-vector computation algorithm to accelerate the search for elliptic curve (EC) base -points.We present a new algorithm for secure Koblitz EC generation based on evolutionary cryptography theory. algorithm The algorithm is tested by selecting a secure Koblitz EC over the field F (2000), with experiments showing that both the base field and base point of the secure curve generated exceed the parameter range for Koblitz curves recommended by NIST. The base fields generated go beyond 1900 bits, which is higher than the 571 bits recommended by NIST.We also find new secure curves in the range F (2 163) - F (2 571) recommended by NIST.We perform a detailed security analysis of those secure curves, showing that those we we qualified satisfy the same security criteria as NIST.
其他文献
记者:首先,我想请王智林董事长简要介绍一下贵公司的主要业务.rn王智林董事长:厦门汉胜秦岭宇航有限公司是由陕西秦岭航空电气公司(35%股份)与美国汉密尔顿胜特兰公司(65%股
飞机退租检工作是一项十分复杂的系统工程,这是因为退租检工作内容十分广泛,退租工作要求质量极高;同时要处理的关系十分复杂,退租检要面对的利益主体较多.除了要面对飞机租
国内电力工程的建设施工中,工程地基往往综合国内外技术来完善施工方案,并不利于工程造价的控制管理。因此,只有认真研究优化土建地基处理技术,才能更好地适用国内行业发展要求。
本文就西北铁路建设发展方向,路网建设提出了综合性的建议.根据朱容基总理巡视青海时的指示精神,对于贯通青藏线、形成以格尔木为中心的铁路枢纽以及路网建设提出了建设性和
特色小镇是社会发展到一定历史阶段的一种区域性空间与要素集聚的发展模式,其成长和发展过程是需要以社会与经济发展为前提的,这个前提不仅包括区位条件、产业基础、区域社会经
本文分析了建设兰渝铁路建设的必要性,迫切性,同时介绍了许多方面人士为兰渝铁路的修建所做的前期工作.这些工作都得到了国务院的重视,将对西部地区的经济建设产生巨大意义.
混凝土是指由砂子、石头、水及水泥按照一定的比例配制成的一种建筑材料,容易成形,输送能力较大,且可以连续作业,在大体积的建筑施工中有其他材料无法比拟的优越性。但是,目前混凝
TakeGoodOpportunitytoAccelerateDevelopment西南航空飞机维修公司以“忠诚老实、一丝不苟、严格要求、精益求精”的机务作风,竭诚为国内外用户提供安全、优质、快捷、方便的
西部大开是党中央为加快西部经济发展做出的一项重大决策.兰州分局必须积极思考,提前谋划,做好思想观念、组织管理、运力资源、人才资源和经营策略等方面的准备,才能抓住西部
本文首先分析了铁路在大西南出海通道中的骨干地位,和目前柳州铁路局铁路运输存在的问题,并分析了在西部大开发中客货运量的增加趋势和运量分布,最后提出了铁路新线建设,路网