The Selection Research of Security Elliptic Curve Cryptography in Packet Network Communication
This paper studies the elliptic curve cryptography in a packet network communication security, the elliptic curve cryptosystem security elliptic curve select principles have been studied by several elliptic curve algorithm based on the analysis put forward the views of this article––that is, should be inclined to choose completely randomly generated by the ideal of security elliptic curve to construct the elliptic curve cryptosystem.
KeywordsPacket network Security Elliptic curve
- 1.Chen L, Bian Z-Z, WeiLi G (2002) The applications of elliptic curve public key cryptosystem in the security e-commerce. Comput Eng 5 Google Scholar
- 2.Shann CE (1949) Communication theory of secrecy systems. BellSystemTecnhiclaJournla 28(4):656–715Google Scholar
- 3.Li X-J, Jing Z-L, Dai G-Z (2002) Public key cryptography based on elliptic curve discrete logarithm problem. Comput Eng Appl 6:20–22Google Scholar
- 4.Wang J-M, Liu J-M (1999) Communication network security theory and technology. Xidian University press, Xi’anGoogle Scholar
- 5.Yu X (2007) Micro-processing structure research of special command block cipher. Microcomput Inf 9:84–86Google Scholar