A survey on the cryptanalysis of elliptic curve cryptography

Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been ma...

Full description

Saved in:
Bibliographic Details
Main Author: Mak, Wai Kit.
Other Authors: Chan Choong Wah
Format: Final Year Project
Language:English
Published: 2010
Subjects:
Online Access:http://hdl.handle.net/10356/40587
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-40587
record_format dspace
spelling sg-ntu-dr.10356-405872023-07-07T17:07:59Z A survey on the cryptanalysis of elliptic curve cryptography Mak, Wai Kit. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Library and information science::Cryptography Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been made on this cryptography method till this day. Many cryptanalysis methods have been developed for Elliptic Curve Cryptography and block ciphers.Cryptanalysis for block ciphers are known to be unsuitable for Elliptic Curve Cryptography.In this report, these different types of cryptanalysis methods shall be discussed. Specific cryptanalysis methods for Elliptic Curve Cryptography and block ciphers shall be discussed in more details. Pollard's Rho cryptanalysis method for Elliptic Curve Cryptography will be program, tested and analyzed for results. Lastly, discussion on the suitability of cryptanalysis for block cipher to be used on Elliptic Curve Cryptography will be made. Bachelor of Engineering 2010-06-16T08:58:07Z 2010-06-16T08:58:07Z 2010 2010 Final Year Project (FYP) http://hdl.handle.net/10356/40587 en Nanyang Technological University 92 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Library and information science::Cryptography
spellingShingle DRNTU::Library and information science::Cryptography
Mak, Wai Kit.
A survey on the cryptanalysis of elliptic curve cryptography
description Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been made on this cryptography method till this day. Many cryptanalysis methods have been developed for Elliptic Curve Cryptography and block ciphers.Cryptanalysis for block ciphers are known to be unsuitable for Elliptic Curve Cryptography.In this report, these different types of cryptanalysis methods shall be discussed. Specific cryptanalysis methods for Elliptic Curve Cryptography and block ciphers shall be discussed in more details. Pollard's Rho cryptanalysis method for Elliptic Curve Cryptography will be program, tested and analyzed for results. Lastly, discussion on the suitability of cryptanalysis for block cipher to be used on Elliptic Curve Cryptography will be made.
author2 Chan Choong Wah
author_facet Chan Choong Wah
Mak, Wai Kit.
format Final Year Project
author Mak, Wai Kit.
author_sort Mak, Wai Kit.
title A survey on the cryptanalysis of elliptic curve cryptography
title_short A survey on the cryptanalysis of elliptic curve cryptography
title_full A survey on the cryptanalysis of elliptic curve cryptography
title_fullStr A survey on the cryptanalysis of elliptic curve cryptography
title_full_unstemmed A survey on the cryptanalysis of elliptic curve cryptography
title_sort survey on the cryptanalysis of elliptic curve cryptography
publishDate 2010
url http://hdl.handle.net/10356/40587
_version_ 1772825731977445376