A survey on the cryptanalysis of elliptic curve cryptography

Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been ma...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Mak, Wai Kit.
مؤلفون آخرون: Chan Choong Wah
التنسيق: Final Year Project
اللغة:English
منشور في: 2010
الموضوعات:
الوصول للمادة أونلاين:http://hdl.handle.net/10356/40587
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
المؤسسة: Nanyang Technological University
اللغة: English
id sg-ntu-dr.10356-40587
record_format dspace
spelling sg-ntu-dr.10356-405872023-07-07T17:07:59Z A survey on the cryptanalysis of elliptic curve cryptography Mak, Wai Kit. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Library and information science::Cryptography Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been made on this cryptography method till this day. Many cryptanalysis methods have been developed for Elliptic Curve Cryptography and block ciphers.Cryptanalysis for block ciphers are known to be unsuitable for Elliptic Curve Cryptography.In this report, these different types of cryptanalysis methods shall be discussed. Specific cryptanalysis methods for Elliptic Curve Cryptography and block ciphers shall be discussed in more details. Pollard's Rho cryptanalysis method for Elliptic Curve Cryptography will be program, tested and analyzed for results. Lastly, discussion on the suitability of cryptanalysis for block cipher to be used on Elliptic Curve Cryptography will be made. Bachelor of Engineering 2010-06-16T08:58:07Z 2010-06-16T08:58:07Z 2010 2010 Final Year Project (FYP) http://hdl.handle.net/10356/40587 en Nanyang Technological University 92 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Library and information science::Cryptography
spellingShingle DRNTU::Library and information science::Cryptography
Mak, Wai Kit.
A survey on the cryptanalysis of elliptic curve cryptography
description Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been made on this cryptography method till this day. Many cryptanalysis methods have been developed for Elliptic Curve Cryptography and block ciphers.Cryptanalysis for block ciphers are known to be unsuitable for Elliptic Curve Cryptography.In this report, these different types of cryptanalysis methods shall be discussed. Specific cryptanalysis methods for Elliptic Curve Cryptography and block ciphers shall be discussed in more details. Pollard's Rho cryptanalysis method for Elliptic Curve Cryptography will be program, tested and analyzed for results. Lastly, discussion on the suitability of cryptanalysis for block cipher to be used on Elliptic Curve Cryptography will be made.
author2 Chan Choong Wah
author_facet Chan Choong Wah
Mak, Wai Kit.
format Final Year Project
author Mak, Wai Kit.
author_sort Mak, Wai Kit.
title A survey on the cryptanalysis of elliptic curve cryptography
title_short A survey on the cryptanalysis of elliptic curve cryptography
title_full A survey on the cryptanalysis of elliptic curve cryptography
title_fullStr A survey on the cryptanalysis of elliptic curve cryptography
title_full_unstemmed A survey on the cryptanalysis of elliptic curve cryptography
title_sort survey on the cryptanalysis of elliptic curve cryptography
publishDate 2010
url http://hdl.handle.net/10356/40587
_version_ 1772825731977445376