Elliptical curve cryptography
In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”. The usag...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/15765 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-15765 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-157652019-12-10T11:23:35Z Elliptical curve cryptography Toh, Zheng Yi. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Engineering::Computer science and engineering::Data::Data encryption In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”. The usage of encryption is vast and wide when this method of providing security can be practiced by militaries and governments to facilitate secret communication. Encryption can also be used in safe guarding confidential information within many kinds of civilian systems, such as computers, storage devices like mobile phones, Bluetooth devices, networks and automated telling machines issued by banks. Elliptical curve cryptography which is suggested by Neal Koblitz and Victor S. Miller is a method to encrypt data based on algebraic structure of elliptic curves over finite fields. It is a means to encrypt data as a means of achieving computer security. In this report, the author is working on Elliptical Curve Cryptography (ECC) in which this report looks at the math of ECC, the different key agreement and key exchange protocols of ECC and analyst their effectiveness against certain attacks. Next, there is the coding section in which the author will be looking at two basic function of ECC which is simply point addition and point doubling. In this section, the author will be presenting C++ codes using the software DEV-C++ that perform the functions of point addition and point doubling and document the ideology behind the C++ codes. Lastly, in the conclusion section, the author will comment on the limitation of this report, document the performance of the results obtained for point addition and point doubling and finally assess the efficiency of ECC as a method to provide computer security. Bachelor of Engineering 2009-05-14T04:25:45Z 2009-05-14T04:25:45Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/15765 en Nanyang Technological University 44 p. application/msword |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Data::Data encryption |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Data::Data encryption Toh, Zheng Yi. Elliptical curve cryptography |
description |
In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”.
The usage of encryption is vast and wide when this method of providing security can be practiced by militaries and governments to facilitate secret communication. Encryption can also be used in safe guarding confidential information within many kinds of civilian systems, such as computers, storage devices like mobile phones, Bluetooth devices, networks and automated telling machines issued by banks.
Elliptical curve cryptography which is suggested by Neal Koblitz and Victor S. Miller is a method to encrypt data based on algebraic structure of elliptic curves over finite fields. It is a means to encrypt data as a means of achieving computer security. In this report, the author is working on Elliptical Curve Cryptography (ECC) in which this report looks at the math of ECC, the different key agreement and key exchange protocols of ECC and analyst their effectiveness against certain attacks.
Next, there is the coding section in which the author will be looking at two basic function of ECC which is simply point addition and point doubling. In this section, the author will be presenting C++ codes using the software DEV-C++ that perform the functions of point addition and point doubling and document the ideology behind the C++ codes.
Lastly, in the conclusion section, the author will comment on the limitation of this report, document the performance of the results obtained for point addition and point doubling and finally assess the efficiency of ECC as a method to provide computer security. |
author2 |
Chan Choong Wah |
author_facet |
Chan Choong Wah Toh, Zheng Yi. |
format |
Final Year Project |
author |
Toh, Zheng Yi. |
author_sort |
Toh, Zheng Yi. |
title |
Elliptical curve cryptography |
title_short |
Elliptical curve cryptography |
title_full |
Elliptical curve cryptography |
title_fullStr |
Elliptical curve cryptography |
title_full_unstemmed |
Elliptical curve cryptography |
title_sort |
elliptical curve cryptography |
publishDate |
2009 |
url |
http://hdl.handle.net/10356/15765 |
_version_ |
1681034578497634304 |