资源描述:
《P.H. ROBERTS and R.N. ZOBEL A DISCUSSION OF ELLIPCTIC CURVE A DISCUSSION OF ELLIPTIC CURVE》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、P.H.ROBERTSandR.N.ZOBEL:ADISCUSSIONOFELLIPCTICCURVEADISCUSSIONOFELLIPTICCURVECRYPTOGRAPHYANDCONFIGURABLEECCSYSTEMDESIGNWITHAPPLICATIONTODISTRIBUTEDSIMULATIONP.H.ROBERTSandR.N.ZOBELDepartmentofComputerScienceUniversityofManchesterOxfordRoadManchesterM139PLAbstract:Distribu
2、tedsimulation,outsideofthemilitaryarea,necessarilyoperatesovertheinternet,whichimpliestheriskofmanyformsofattack.Currentsecuritysystemsofferlimitedprotectionbecauseofthecostandcomplexityofusingsufficientkeylengthsinexistingpublickeyencryptionschemes.TheuseoftheDiscreteLog
3、arithmProblemoverellipticcurvesdefinedoverfinitefieldsasabasisfortrap-doorbasedpublickeyencryption(ECC)appearstoofferimprovedperformancewithlowercostintermsofprocessorspeed,memoryrequirementandprocessingtime.ThispaperprovidesanoutlineofECCandthecomplexitiesofapracticalimp
4、lementationofthetechnology.SomeissuesregardingchoiceofECparameters,security,interoperabilityandperformancearediscussed.AproposalismadeforaconfigurableECCsystemarchitectureandthehigh-leveldesignofatoolkittoenablethedevelopmentofECCsystemsisdiscussed.ECCcryptographicsystems
5、maybeconsideredparticularlysuitableforsupportingdistributedinteractivesimulation,withitsstringenttimingrequirementsandparticularsecurityproblems,withadditionalreferencetomobilesystems.Keywords:Cryptography,EllipticCurve,DistributedSimulation,ECC,SystemArchitecture,Authent
6、ication1.INTRODUCTIONattacks,butarelesslikelytobetargetedifitisdifficulttoidentifywhoaretheparticipantsinaIncreasingly,distributedsimulationisrequiredforadistributedsimulationexerciseandwhereonthevarietyofreasons,suchasmodelsrunningundernetworktheyare.differingoperatingsy
7、stems,clockspeedsorsimulationenvironments,orforreasonsof1.2Securityservicescommercial,governmentormilitarysecrecy.Forcostreasons,manyofthesesystemsnowhavetouseThereareseveralimportantaspectsofsecuritytheinternettocarrytheirintercommunicationtraffic.whichdirectlyimpactonth
8、euseofauthenticationConsequently,theriskoflostormodifieddata,lossandencryptionfordistributedsimu