Elliptical curve cryptography

In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”. The usag...

Full description

Saved in:
Bibliographic Details
Main Author: Toh, Zheng Yi.
Other Authors: Chan Choong Wah
Format: Final Year Project
Language:English
Published: 2009
Subjects:
Online Access:http://hdl.handle.net/10356/15765
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-15765
record_format dspace
spelling sg-ntu-dr.10356-157652019-12-10T11:23:35Z Elliptical curve cryptography Toh, Zheng Yi. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Engineering::Computer science and engineering::Data::Data encryption In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”. The usage of encryption is vast and wide when this method of providing security can be practiced by militaries and governments to facilitate secret communication. Encryption can also be used in safe guarding confidential information within many kinds of civilian systems, such as computers, storage devices like mobile phones, Bluetooth devices, networks and automated telling machines issued by banks. Elliptical curve cryptography which is suggested by Neal Koblitz and Victor S. Miller is a method to encrypt data based on algebraic structure of elliptic curves over finite fields. It is a means to encrypt data as a means of achieving computer security. In this report, the author is working on Elliptical Curve Cryptography (ECC) in which this report looks at the math of ECC, the different key agreement and key exchange protocols of ECC and analyst their effectiveness against certain attacks. Next, there is the coding section in which the author will be looking at two basic function of ECC which is simply point addition and point doubling. In this section, the author will be presenting C++ codes using the software DEV-C++ that perform the functions of point addition and point doubling and document the ideology behind the C++ codes. Lastly, in the conclusion section, the author will comment on the limitation of this report, document the performance of the results obtained for point addition and point doubling and finally assess the efficiency of ECC as a method to provide computer security. Bachelor of Engineering 2009-05-14T04:25:45Z 2009-05-14T04:25:45Z 2009 2009 Final Year Project (FYP) http://hdl.handle.net/10356/15765 en Nanyang Technological University 44 p. application/msword
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Data::Data encryption
spellingShingle DRNTU::Engineering::Computer science and engineering::Data::Data encryption
Toh, Zheng Yi.
Elliptical curve cryptography
description In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”. The usage of encryption is vast and wide when this method of providing security can be practiced by militaries and governments to facilitate secret communication. Encryption can also be used in safe guarding confidential information within many kinds of civilian systems, such as computers, storage devices like mobile phones, Bluetooth devices, networks and automated telling machines issued by banks. Elliptical curve cryptography which is suggested by Neal Koblitz and Victor S. Miller is a method to encrypt data based on algebraic structure of elliptic curves over finite fields. It is a means to encrypt data as a means of achieving computer security. In this report, the author is working on Elliptical Curve Cryptography (ECC) in which this report looks at the math of ECC, the different key agreement and key exchange protocols of ECC and analyst their effectiveness against certain attacks. Next, there is the coding section in which the author will be looking at two basic function of ECC which is simply point addition and point doubling. In this section, the author will be presenting C++ codes using the software DEV-C++ that perform the functions of point addition and point doubling and document the ideology behind the C++ codes. Lastly, in the conclusion section, the author will comment on the limitation of this report, document the performance of the results obtained for point addition and point doubling and finally assess the efficiency of ECC as a method to provide computer security.
author2 Chan Choong Wah
author_facet Chan Choong Wah
Toh, Zheng Yi.
format Final Year Project
author Toh, Zheng Yi.
author_sort Toh, Zheng Yi.
title Elliptical curve cryptography
title_short Elliptical curve cryptography
title_full Elliptical curve cryptography
title_fullStr Elliptical curve cryptography
title_full_unstemmed Elliptical curve cryptography
title_sort elliptical curve cryptography
publishDate 2009
url http://hdl.handle.net/10356/15765
_version_ 1681034578497634304