Font Size: a A A

Application Of Encryption Algorithm In Electronic Identification

Posted on:2022-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:S GaoFull Text:PDF
GTID:2518306602473944Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Nowadays,we have entered the digital era,and all components of existence and work have regularly grew to become to the on-line platform.In an information-based society,"Internet+" is making speedy progress.Today,the Internet has end up an necessary beginning factor for innovation and entrepreneurship.E-commerce is turning into mainstream,and e-government has added first-rate comfort to people.According to the cutting-edge state of affairs of a number of industries,the integration of the actual society and the community society is an irresistable trend.In some ways,even though it brings handy for people's life,enhancing the effectivity of the a range of aspects,however each coin has two sides,we must appear at the improvement of the Internet in a complete way.While it assist us to minimize the time wanted for duties,it additionally brings a lot of community protection problems,in particular the non-public statistics.In current years,the hassle of personal information facts being used fraudulently and misappropriated has come to be greater and extra serious.The reason why this kind of phenomenon will happen is mainly because in the cyber space,the development company can not effectively manage and screen the identification of every user.Therefore,in order to reduce the theft of personal data and in addition guard the rights and pastimes of clients in the community digital area,the network electronic identity eID came into being and is constantly improving.The work of this paper basically consists of the following two aspects:1.Based on two algorithms rsa encryption algorithm and elliptic curve encryption algorithm,this paper realizes two encryption algorithms for personal information encryption,and optimizes these two algorithms,which improves the algorithm speed on the premise of ensuring security.In the process of experiment,the attack scheme is introduced,and the two algorithms are compared by analyzing the time of encryption and cracking.2.The process of eID is simplified,and the elliptic curve encryption algorithm is used in the simplified process.When the user's real name authentication is realized in the online application,the online application organization obtains the personal information,requests the eID network identity operation and service organization to verify the user's identity,and the eID issuing center performs the secondary verification,After passing,it returns the coding process of the user that uniquely corresponds to the application.
Keywords/Search Tags:electronic identification, RSA encryption algorithm, elliptic curve encryption algorithm
PDF Full Text Request
Related items