| Cryptography is the general term for all kinds of data encryption and decryption technology,the meaning of information in the transmission process is mainly reflected in the hidden, in order to achieve a certain security at present. Cryptography has been widely used in the field of computer science, especially in the field of power control and network information transmission. In the course of the development of cryptography, there have been many classic encryption and decryption algorithms,such as RSA, DSA, but these algorithms have some shortcomings of complexity and security. Koblitz and Miller proposed a new encryption algorithm, that is, elliptic encryption algorithm(ECC) in 1985, ECC is a kind of asymmetric encryption technology. Algorithm theory is based on the use of rational Elements on elliptic curves constitute the Abel additive group on the elliptic discrete logarithm of the computational difficulties. Compared with the traditional non symmetric encryption algorithm, ECC has the advantages of high security and fast computation speed. The basic idea of ECC is to find a curve that meets the requirements of the curve, and then we want to transfer the information embedded in the text to the curve, on the basis of encryption and decryption operations. The research of elliptic curve encryption technology has a very positive meaning for data security and network security.In the elliptic curve encryption algorithm, the most important operation is the Element addition operation, this is also used in the process of encryption and decryption of the most basic computing. One of the main functions of this paper is to complete the operation of elliptic curve. The various elements of the elliptic curve defined on a certain domain can be calculated, which can be a rational number field, a complex number field, or a finite field. Based on elliptic curve discrete logarithm problem is based on elliptic curve,On the basis of elliptic curve operation, this paper focuses on the implementation of the elliptic curve encryption algorithm.This paper discusses gives some necessary analysis of three aspects of functional requirements, performance requirements and constraints. Constructing the overall design framework of the project, laiding the foundation of research and implementation later. Then this paper analyze the basic theory of elliptic curveencryption algorithm. For the generation of the elliptic curve and the computing process carries on the elaboration and the vail Weierstrass equation and simplified ware Weierstrass equation algorithm carried out a full theoretical study, at the end of the development of elliptic curve operation and on the basis of the encryption algorithm based on elliptic curve is studied, and do the experiment of study results based on vc++ platform. |