Current location - Quotes Website - Personality signature - How to realize digital signature through hash function and elliptic curve cryptography algorithm
How to realize digital signature through hash function and elliptic curve cryptography algorithm
The security of RSA mainly depends on the difficulty of finding the inverse of the mathematical function of its encryption algorithm, which is the same as most public key cryptosystems (for example, ElGamal algorithm is based on the difficulty of discrete logarithm problem, and we call such a function one-way function. One-way function can't be directly used as a cryptosystem, because if plaintext is encrypted with one-way function, even the legitimate receiver can't restore plaintext. Because the inverse operation of one-way function is difficult, there is an effective algorithm to calculate the trapped one-way function, that is, the function that is more closely related to the cryptosystem and its inverse function, and the method of calculating the function can be disclosed. The concepts of one-way function and trappable one-way function are the core of public key cryptography and are very important to the construction of public key cryptosystem. It can even be said that the design of public key cryptosystem is the design of one-way function.

ECDsA algorithm applies DsA to elliptic curve equation, and the basis of security is obtained from finite field.

The difficulty of discrete logarithm becomes the difficulty of calculating discrete logarithm on elliptic curve group, and the safety foundation is changed.

Change, so that the length of the key used under the same security degree is shortened, and only the key with the length of 192 bits can be used.

In order to ensure security, DSA algorithm needs a key of 1024 bits to ensure sufficient security. improved

The improved ECDSA algorithm improves the efficiency of algorithm implementation.