01whole.pdf (40.83 MB)
Download file

Elliptic curve cryptographic protocols: a simulation and implementation of ECDSA and ECDH

Download (40.83 MB)
thesis
posted on 28.03.2022, 16:34 by Nathan Levett
Elliptic curve cryptography provides a secure means of implementing the Digital Signature Algorithm protocol through the Elliptic Curve Digital Signature Algorithm scheme. The ECDSA upholds the data security objectives of information authentication and non-reputability. Similarly, the Elliptic Curve Diffie-Hellman upholds information confidentiality and information integrity, are expensive to implement up to certain security standards, with timeliness and size of circuit required to perform either scheme being the main considerations. To have any appreciable speed, they must be implemented in digital hardware design. This project outlines the design methodology and procedure of simulating a generalisable implementation of an Elliptic Curve Cryptographic Processor, able to effectively utilise both the ECDH and ECDSA, over any chosen bit length.

History

Table of Contents

1. Introduction -- 2. Topic background -- 3. Mathematical background -- 4. Modelling ECC protocols -- 5. VHDL implementation -- 6. VHDL simulation -- 7. Future work -- 8. Abbreviations -- BIbliography.

Notes

Bibliography: pages 205-207 Empirical thesis.

Awarding Institution

Macquarie University

Degree Type

Thesis bachelor honours

Degree

BSc (Hons), Macquarie University, Faculty of Science and Engineering, School of Engineering

Department, Centre or School

School of Engineering

Year of Award

2017

Principal Supervisor

Md Selim Hossain

Additional Supervisor 1

Yinan Kong

Rights

Copyright Nathan Levett 2017. Copyright disclaimer: http://mq.edu.au/library/copyright

Language

English

Extent

1 online resource (xvii, 207 pages diagrams)

Former Identifiers

mq:70303 http://hdl.handle.net/1959.14/1262355

Usage metrics

Keywords

Exports