New algorithms and architectures for arithmetic in GF(2[superscript m]) suitable for elliptic curve cryptography Public Deposited

http://ir.library.oregonstate.edu/concern/graduate_thesis_or_dissertations/0z709008d

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • During the last few years we have seen formidable advances in digital and mobile communication technologies such as cordless and cellular telephones, personal communication systems, Internet connection expansion, etc. The vast majority of digital information used in all these applications is stored and also processed within a computer system, and then transferred between computers via fiber optic, satellite systems, and/or Internet. In all these new scenarios, secure information transmission and storage has a paramount importance in the emerging international information infrastructure, especially, for supporting electronic commerce and other security related services. The techniques for the implementation of secure information handling and management are provided by cryptography, which can be succinctly defined as the study of how to establish secure communication in an adversarial environment. Among the most important applications of cryptography, we can mention data encryption, digital cash, digital signatures, digital voting, network authentication, data distribution and smart cards. The security of currently used cryptosystems is based on the computational complexity of an underlying mathematical problem, such as factoring large numbers or computing discrete logarithms for large numbers. These problems, are believed to be very hard to solve. In the practice, only a small number of mathematical structures could so far be applied to build public-key mechanisms. When an elliptic curve is defined over a finite field, the points on the curve form an Abelian group. In particular, the discrete logarithm problem in this group is believed to be an extremely hard mathematical problem. High performance implementations of elliptic curve cryptography depend heavily on the efficiency in the computation of the finite field arithmetic operations needed for the elliptic curve operations. The main focus of this dissertation is the study and analysis of efficient hardware and software algorithms suitable for the implementation of finite field arithmetic. This focus is crucial for a number of security and efficiency aspects of cryptosystems based on finite field algebra, and specially relevant for elliptic curve cryptosystems. Particularly, we are interested in the problem of how to implement efficiently three of the most common and costly finite field operations: multiplication, squaring, and inversion.
Resource Type
Date Available
Date Copyright
Date Issued
Degree Level
Degree Name
Degree Field
Degree Grantor
Commencement Year
Advisor
Academic Affiliation
Non-Academic Affiliation
Subject
Rights Statement
Peer Reviewed
Language
Digitization Specifications
  • File scanned at 300 ppi (Monochrome) using ScandAll PRO 1.8.1 on a Fi-6770A in PDF format. CVista PdfCompressor 4.0 was used for pdf compression and textual OCR.
Replaces
Additional Information
  • description.provenance : Approved for entry into archive by Patricia Black(patricia.black@oregonstate.edu) on 2012-08-17T17:34:36Z (GMT) No. of bitstreams: 1 RodriguezHeriquezFrancisco2001.pdf: 1052006 bytes, checksum: 0f13b1a892766fe5e27de4edf05ceeae (MD5)
  • description.provenance : Submitted by Kaylee Patterson (kdpscanner@gmail.com) on 2012-08-16T18:28:26Z No. of bitstreams: 1 RodriguezHeriquezFrancisco2001.pdf: 1052006 bytes, checksum: 0f13b1a892766fe5e27de4edf05ceeae (MD5)
  • description.provenance : Approved for entry into archive by Patricia Black(patricia.black@oregonstate.edu) on 2012-08-17T17:37:17Z (GMT) No. of bitstreams: 1 RodriguezHeriquezFrancisco2001.pdf: 1052006 bytes, checksum: 0f13b1a892766fe5e27de4edf05ceeae (MD5)
  • description.provenance : Made available in DSpace on 2012-08-17T17:37:17Z (GMT). No. of bitstreams: 1 RodriguezHeriquezFrancisco2001.pdf: 1052006 bytes, checksum: 0f13b1a892766fe5e27de4edf05ceeae (MD5) Previous issue date: 2000-06-07

Relationships

Parents:

This work has no parents.

Last modified

Downloadable Content

Download PDF

Items