Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/15754 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-15754 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-157542023-07-07T17:05:34Z Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm Tan, Vincent Soon Heng. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key Agreement scheme which we will be discussing on. As compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumptions, as well as memory and bandwidth savings. This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. This project involves the analysis an implementation of Elliptic Curve Diffie-Hellam (ECDH) Key Agreement Algorithm. The project report provides a detailed on the fundamental of modular arithmetic and Elliptic Cryptography Curve (ECC) cryptography theories. This report also provides a theoretical background on Diffie-Hellman Key Agreement scheme. Then, the performance of the implemented ECDH algorithm is being analyzed based on the key sizes used for the elliptic curve. The algorithm benchmark is based on the key generation speed in terms of CPU processing speed, processor type and Random Access Memory (RAM). Subsequently, the methodologies are derived for the performance evaluation process which is carried out under Windows operating systems. The evaluation processes are to identify the performance of untested platforms. The three different major Windows operating systems used are: Windows XP Professional, Windows Vista Home and Windows Vista Business. Bachelor of Engineering 2009-05-14T04:07:24Z 2009-05-14T04:07:24Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/15754 en Nanyang Technological University 91 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Tan, Vincent Soon Heng. Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm |
description |
With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key Agreement scheme which we will be discussing on. As compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumptions, as well as memory and bandwidth savings. This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity.
This project involves the analysis an implementation of Elliptic Curve Diffie-Hellam (ECDH) Key Agreement Algorithm. The project report provides a detailed on the fundamental of modular arithmetic and Elliptic Cryptography Curve (ECC) cryptography theories. This report also provides a theoretical background on Diffie-Hellman Key Agreement scheme. Then, the performance of the implemented ECDH algorithm is being analyzed based on the key sizes used for the elliptic curve. The algorithm benchmark is based on the key generation speed in terms of CPU processing speed, processor type and Random Access Memory (RAM). Subsequently, the methodologies are derived for the performance evaluation process which is carried out under Windows operating systems. The evaluation processes are to identify the performance of untested platforms. The three different major Windows operating systems used are: Windows XP Professional, Windows Vista Home and Windows Vista Business. |
author2 |
Chan Choong Wah |
author_facet |
Chan Choong Wah Tan, Vincent Soon Heng. |
format |
Final Year Project |
author |
Tan, Vincent Soon Heng. |
author_sort |
Tan, Vincent Soon Heng. |
title |
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm |
title_short |
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm |
title_full |
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm |
title_fullStr |
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm |
title_full_unstemmed |
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm |
title_sort |
analysis and implementation of national security agency (nsa) suite b : elliptic-curve diffie-hellman (ecdh) key agreement algorithm |
publishDate |
2009 |
url |
http://hdl.handle.net/10356/15754 |
_version_ |
1772828647463321600 |