Weak implementations of elliptic curve cryptography

Elliptic curve cryptography is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. Certain choices of elliptic curves and/or underlying fields can reduce the security of an elliptic curve cryptosystem. This paper describes some factors th...

Full description

Bibliographic Details
Main Author: Koo, Yu Fang
Other Authors: Tay Kian Boon
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2024
Subjects:
Online Access:https://hdl.handle.net/10356/175026
_version_ 1811695105931739136
author Koo, Yu Fang
author2 Tay Kian Boon
author_facet Tay Kian Boon
Koo, Yu Fang
author_sort Koo, Yu Fang
collection NTU
description Elliptic curve cryptography is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. Certain choices of elliptic curves and/or underlying fields can reduce the security of an elliptic curve cryptosystem. This paper describes some factors that can affect the strength of the elliptic curve cryptosystem, as well as a discussion of the attacks that cause these weaknesses. Following that, suggestions on ways to avoid weak implementations will be provided to help developers create a secure elliptic curve cryptosystem.
first_indexed 2024-10-01T07:18:11Z
format Final Year Project (FYP)
id ntu-10356/175026
institution Nanyang Technological University
language English
last_indexed 2024-10-01T07:18:11Z
publishDate 2024
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1750262024-04-19T15:46:32Z Weak implementations of elliptic curve cryptography Koo, Yu Fang Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Computer and Information Science Elliptic curves Elliptic curve cryptography is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. Certain choices of elliptic curves and/or underlying fields can reduce the security of an elliptic curve cryptosystem. This paper describes some factors that can affect the strength of the elliptic curve cryptosystem, as well as a discussion of the attacks that cause these weaknesses. Following that, suggestions on ways to avoid weak implementations will be provided to help developers create a secure elliptic curve cryptosystem. Bachelor's degree 2024-04-18T08:38:00Z 2024-04-18T08:38:00Z 2024 Final Year Project (FYP) Koo, Y. F. (2024). Weak implementations of elliptic curve cryptography. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/175026 https://hdl.handle.net/10356/175026 en application/pdf Nanyang Technological University
spellingShingle Computer and Information Science
Elliptic curves
Koo, Yu Fang
Weak implementations of elliptic curve cryptography
title Weak implementations of elliptic curve cryptography
title_full Weak implementations of elliptic curve cryptography
title_fullStr Weak implementations of elliptic curve cryptography
title_full_unstemmed Weak implementations of elliptic curve cryptography
title_short Weak implementations of elliptic curve cryptography
title_sort weak implementations of elliptic curve cryptography
topic Computer and Information Science
Elliptic curves
url https://hdl.handle.net/10356/175026
work_keys_str_mv AT kooyufang weakimplementationsofellipticcurvecryptography