Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm

With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange...

全面介紹

Saved in:
書目詳細資料
主要作者: Tan, Vincent Soon Heng.
其他作者: Chan Choong Wah
格式: Final Year Project
語言:English
出版: 2009
主題:
在線閱讀:http://hdl.handle.net/10356/15754
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
id sg-ntu-dr.10356-15754
record_format dspace
spelling sg-ntu-dr.10356-157542023-07-07T17:05:34Z Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm Tan, Vincent Soon Heng. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key Agreement scheme which we will be discussing on. As compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumptions, as well as memory and bandwidth savings. This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. This project involves the analysis an implementation of Elliptic Curve Diffie-Hellam (ECDH) Key Agreement Algorithm. The project report provides a detailed on the fundamental of modular arithmetic and Elliptic Cryptography Curve (ECC) cryptography theories. This report also provides a theoretical background on Diffie-Hellman Key Agreement scheme. Then, the performance of the implemented ECDH algorithm is being analyzed based on the key sizes used for the elliptic curve. The algorithm benchmark is based on the key generation speed in terms of CPU processing speed, processor type and Random Access Memory (RAM). Subsequently, the methodologies are derived for the performance evaluation process which is carried out under Windows operating systems. The evaluation processes are to identify the performance of untested platforms. The three different major Windows operating systems used are: Windows XP Professional, Windows Vista Home and Windows Vista Business. Bachelor of Engineering 2009-05-14T04:07:24Z 2009-05-14T04:07:24Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/15754 en Nanyang Technological University 91 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Tan, Vincent Soon Heng.
Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
description With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key Agreement scheme which we will be discussing on. As compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumptions, as well as memory and bandwidth savings. This is especially true and useful for applications like mobile devices which are typically limited in terms of their CPU processing speed, power and network connectivity. This project involves the analysis an implementation of Elliptic Curve Diffie-Hellam (ECDH) Key Agreement Algorithm. The project report provides a detailed on the fundamental of modular arithmetic and Elliptic Cryptography Curve (ECC) cryptography theories. This report also provides a theoretical background on Diffie-Hellman Key Agreement scheme. Then, the performance of the implemented ECDH algorithm is being analyzed based on the key sizes used for the elliptic curve. The algorithm benchmark is based on the key generation speed in terms of CPU processing speed, processor type and Random Access Memory (RAM). Subsequently, the methodologies are derived for the performance evaluation process which is carried out under Windows operating systems. The evaluation processes are to identify the performance of untested platforms. The three different major Windows operating systems used are: Windows XP Professional, Windows Vista Home and Windows Vista Business.
author2 Chan Choong Wah
author_facet Chan Choong Wah
Tan, Vincent Soon Heng.
format Final Year Project
author Tan, Vincent Soon Heng.
author_sort Tan, Vincent Soon Heng.
title Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_short Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_full Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_fullStr Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_full_unstemmed Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
title_sort analysis and implementation of national security agency (nsa) suite b : elliptic-curve diffie-hellman (ecdh) key agreement algorithm
publishDate 2009
url http://hdl.handle.net/10356/15754
_version_ 1772828647463321600