A survey on the cryptanalysis of elliptic curve cryptography

Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been ma...

Full description

Bibliographic Details
Main Author: Mak, Wai Kit.
Other Authors: Chan Choong Wah
Format: Final Year Project (FYP)
Language:English
Published: 2010
Subjects:
Online Access:http://hdl.handle.net/10356/40587
_version_ 1826113202039029760
author Mak, Wai Kit.
author2 Chan Choong Wah
author_facet Chan Choong Wah
Mak, Wai Kit.
author_sort Mak, Wai Kit.
collection NTU
description Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been made on this cryptography method till this day. Many cryptanalysis methods have been developed for Elliptic Curve Cryptography and block ciphers.Cryptanalysis for block ciphers are known to be unsuitable for Elliptic Curve Cryptography.In this report, these different types of cryptanalysis methods shall be discussed. Specific cryptanalysis methods for Elliptic Curve Cryptography and block ciphers shall be discussed in more details. Pollard's Rho cryptanalysis method for Elliptic Curve Cryptography will be program, tested and analyzed for results. Lastly, discussion on the suitability of cryptanalysis for block cipher to be used on Elliptic Curve Cryptography will be made.
first_indexed 2024-10-01T03:19:20Z
format Final Year Project (FYP)
id ntu-10356/40587
institution Nanyang Technological University
language English
last_indexed 2024-10-01T03:19:20Z
publishDate 2010
record_format dspace
spelling ntu-10356/405872023-07-07T17:07:59Z A survey on the cryptanalysis of elliptic curve cryptography Mak, Wai Kit. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Library and information science::Cryptography Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. Strength of the Elliptic Curve Cryptography depends very much on the type of curve, the points and field chosen. However no known successful attacks have been made on this cryptography method till this day. Many cryptanalysis methods have been developed for Elliptic Curve Cryptography and block ciphers.Cryptanalysis for block ciphers are known to be unsuitable for Elliptic Curve Cryptography.In this report, these different types of cryptanalysis methods shall be discussed. Specific cryptanalysis methods for Elliptic Curve Cryptography and block ciphers shall be discussed in more details. Pollard's Rho cryptanalysis method for Elliptic Curve Cryptography will be program, tested and analyzed for results. Lastly, discussion on the suitability of cryptanalysis for block cipher to be used on Elliptic Curve Cryptography will be made. Bachelor of Engineering 2010-06-16T08:58:07Z 2010-06-16T08:58:07Z 2010 2010 Final Year Project (FYP) http://hdl.handle.net/10356/40587 en Nanyang Technological University 92 p. application/pdf
spellingShingle DRNTU::Library and information science::Cryptography
Mak, Wai Kit.
A survey on the cryptanalysis of elliptic curve cryptography
title A survey on the cryptanalysis of elliptic curve cryptography
title_full A survey on the cryptanalysis of elliptic curve cryptography
title_fullStr A survey on the cryptanalysis of elliptic curve cryptography
title_full_unstemmed A survey on the cryptanalysis of elliptic curve cryptography
title_short A survey on the cryptanalysis of elliptic curve cryptography
title_sort survey on the cryptanalysis of elliptic curve cryptography
topic DRNTU::Library and information science::Cryptography
url http://hdl.handle.net/10356/40587
work_keys_str_mv AT makwaikit asurveyonthecryptanalysisofellipticcurvecryptography
AT makwaikit surveyonthecryptanalysisofellipticcurvecryptography