Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm

With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange...

Full description

Saved in:
Bibliographic Details
Main Author: Tan, Vincent Soon Heng.
Other Authors: Chan Choong Wah
Format: Final Year Project
Language:English
Published: 2009
Subjects:
Online Access:http://hdl.handle.net/10356/15754
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-15754
record_format dspace
spelling sg-ntu-dr.10356-157542023-07-07T17:05:34Z Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm Tan, Vincent Soon Heng. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key Agreement scheme which we will be discussing on. As compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumptions, as well as memory and bandwidth savings. This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. This project involves the analysis an implementation of Elliptic Curve Diffie-Hellam (ECDH) Key Agreement Algorithm. The project report provides a detailed on the fundamental of modular arithmetic and Elliptic Cryptography Curve (ECC) cryptography theories. This report also provides a theoretical background on Diffie-Hellman Key Agreement scheme. Then, the performance of the implemented ECDH algorithm is being analyzed based on the key sizes used for the elliptic curve. The algorithm benchmark is based on the key generation speed in terms of CPU processing speed, processor type and Random Access Memory (RAM). Subsequently, the methodologies are derived for the performance evaluation process which is carried out under Windows operating systems. The evaluation processes are to identify the performance of untested platforms. The three different major Windows operating systems used are: Windows XP Professional, Windows Vista Home and Windows Vista Business. Bachelor of Engineering 2009-05-14T04:07:24Z 2009-05-14T04:07:24Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/15754 en Nanyang Technological University 91 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Tan, Vincent Soon Heng.
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
description With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key Agreement scheme which we will be discussing on. As compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumptions, as well as memory and bandwidth savings. This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. This project involves the analysis an implementation of Elliptic Curve Diffie-Hellam (ECDH) Key Agreement Algorithm. The project report provides a detailed on the fundamental of modular arithmetic and Elliptic Cryptography Curve (ECC) cryptography theories. This report also provides a theoretical background on Diffie-Hellman Key Agreement scheme. Then, the performance of the implemented ECDH algorithm is being analyzed based on the key sizes used for the elliptic curve. The algorithm benchmark is based on the key generation speed in terms of CPU processing speed, processor type and Random Access Memory (RAM). Subsequently, the methodologies are derived for the performance evaluation process which is carried out under Windows operating systems. The evaluation processes are to identify the performance of untested platforms. The three different major Windows operating systems used are: Windows XP Professional, Windows Vista Home and Windows Vista Business.
author2 Chan Choong Wah
author_facet Chan Choong Wah
Tan, Vincent Soon Heng.
format Final Year Project
author Tan, Vincent Soon Heng.
author_sort Tan, Vincent Soon Heng.
title Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_short Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_full Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_fullStr Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_full_unstemmed Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_sort analysis and implementation of national security agency (nsa) suite b : elliptic-curve diffie-hellman (ecdh) key agreement algorithm
publishDate 2009
url http://hdl.handle.net/10356/15754
_version_ 1772828647463321600