01whole.pdf (40.83 MB)
Download file

Elliptic curve cryptographic protocols: a simulation and implementation of ECDSA and ECDH

Download (40.83 MB)
posted on 28.03.2022, 16:34 authored by Nathan Levett
Elliptic curve cryptography provides a secure means of implementing the Digital Signature Algorithm protocol through the Elliptic Curve Digital Signature Algorithm scheme. The ECDSA upholds the data security objectives of information authentication and non-reputability. Similarly, the Elliptic Curve Diffie-Hellman upholds information confidentiality and information integrity, are expensive to implement up to certain security standards, with timeliness and size of circuit required to perform either scheme being the main considerations. To have any appreciable speed, they must be implemented in digital hardware design. This project outlines the design methodology and procedure of simulating a generalisable implementation of an Elliptic Curve Cryptographic Processor, able to effectively utilise both the ECDH and ECDSA, over any chosen bit length.


Table of Contents

1. Introduction -- 2. Topic background -- 3. Mathematical background -- 4. Modelling ECC protocols -- 5. VHDL implementation -- 6. VHDL simulation -- 7. Future work -- 8. Abbreviations -- BIbliography.


Bibliography: pages 205-207 Empirical thesis.

Awarding Institution

Macquarie University

Degree Type

Thesis bachelor honours


BSc (Hons), Macquarie University, Faculty of Science and Engineering, School of Engineering

Department, Centre or School

School of Engineering

Year of Award


Principal Supervisor

Md Selim Hossain

Additional Supervisor 1

Yinan Kong


Copyright Nathan Levett 2017. Copyright disclaimer: http://mq.edu.au/library/copyright




1 online resource (xvii, 207 pages diagrams)

Former Identifiers

mq:70303 http://hdl.handle.net/1959.14/1262355

Usage metrics