المستودع الرقمى

//uquui/

تقرير الوحدة

تقرير المجموعة

 2020

 تحسين سرعة بروتوكول تبادل المفاتيح Diffie-Hellman المستند إلى تناسق التماثل الفائق ما بعد الكم

 Abdallah, Saeed Ali Balubaid


//uquui/handle/20.500.12248/130826
0 التحميل
690 المشاهدات

تحسين سرعة بروتوكول تبادل المفاتيح Diffie-Hellman المستند إلى تناسق التماثل الفائق ما بعد الكم

عناوين أخرى : Improving the Speed of The Post-Quantum Supersingular Isogeny-Based Diffie-Hellman Key Exchange Protocol
رقم الطلب : 24261
الناشر :جامعة أم القرى
مكان النشر : مكة المكرمة
تاريخ النشر : 2020 - 1441 هـ
الوصف : 66 ورقة.
نوع الوعاء : ماجستير
اللغة : انجليزي
المصدر : مكتبة الملك عبدالله بن عبدالعزيز الجامعية
يظهر في المجموعات : الرسائل العلمية المحدثة

Super singular Isogeny-based Diffie-Hellman (SIDH) key exchange protocol has recently gained an increasing attraction and is considered as a good candidate of the post-quantum algorithms family. As of today, the best-known algorithms against the SIDH protocol have an exponential time complexity for both classical and quantum attackers. The core of SIDH built with the elliptic curve cryptography (ECC) which is a public key encryption method based on elliptic curve. In a typical elliptic curve cryptosystem, elliptic curve point multiplication is the most computationally expensive component. In other words, it’s also called scalar multiplication which is quite computationally expensive. Therefore, it is more attractive to implement the ECC with their scalar multiplication operations in faster way. In this thesis, we propose a faster scalar multiplication of the implementation the elliptic curve point multiplication in binary Galois field GF(2^m). Experimental results demonstrate that the proposed approach which is called here the Reference Point Array (RPA), The implementation can speed up the elliptic curve scalar multiplication by 25.2% better than other’s implementations, that saved time and enhancement caused by the number of saved doubles, This because using the advantage of RPA. We have simulated the proposed approach of the elliptic curve point multiplication using Java programming language and Implemented it on High-end Intel Core i7-7500U @ 2.9Ghz. The platform used is NetBeans IDE version 8.2 as research programming environment for simulating our proposed approach. Keywords: Elliptic Curve, Cryptography, Public Key Encryption, ECC, Symmetric Cryptography, Information Security, Scalar Multiplication, Point Multiplication, Cryptosystems, Key Exchange.

العنوان: تحسين سرعة بروتوكول تبادل المفاتيح Diffie-Hellman المستند إلى تناسق التماثل الفائق ما بعد الكم
عناوين أخرى: Improving the Speed of The Post-Quantum Supersingular Isogeny-Based Diffie-Hellman Key Exchange Protocol
المؤلفون: Al-Somani, Turki
Abdallah, Saeed Ali Balubaid
الموضوعات :: Computer Science
Computer and engineering
تاريخ النشر :: 2020
الناشر :: جامعة أم القرى
الملخص: Super singular Isogeny-based Diffie-Hellman (SIDH) key exchange protocol has recently gained an increasing attraction and is considered as a good candidate of the post-quantum algorithms family. As of today, the best-known algorithms against the SIDH protocol have an exponential time complexity for both classical and quantum attackers. The core of SIDH built with the elliptic curve cryptography (ECC) which is a public key encryption method based on elliptic curve. In a typical elliptic curve cryptosystem, elliptic curve point multiplication is the most computationally expensive component. In other words, it’s also called scalar multiplication which is quite computationally expensive. Therefore, it is more attractive to implement the ECC with their scalar multiplication operations in faster way. In this thesis, we propose a faster scalar multiplication of the implementation the elliptic curve point multiplication in binary Galois field GF(2^m). Experimental results demonstrate that the proposed approach which is called here the Reference Point Array (RPA), The implementation can speed up the elliptic curve scalar multiplication by 25.2% better than other’s implementations, that saved time and enhancement caused by the number of saved doubles, This because using the advantage of RPA. We have simulated the proposed approach of the elliptic curve point multiplication using Java programming language and Implemented it on High-end Intel Core i7-7500U @ 2.9Ghz. The platform used is NetBeans IDE version 8.2 as research programming environment for simulating our proposed approach. Keywords: Elliptic Curve, Cryptography, Public Key Encryption, ECC, Symmetric Cryptography, Information Security, Scalar Multiplication, Point Multiplication, Cryptosystems, Key Exchange.
الوصف :: 66 ورقة.
الرابط: http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130826
يظهر في المجموعات :الرسائل العلمية المحدثة

الملفات في هذا العنصر:
ملف الوصف الحجمالتنسيق 
24261.pdf
"   الوصول المحدود"
الرسالة الكاملة1.39 MBAdobe PDFعرض/ فتح
طلب نسخة
absa24261.pdf
"   الوصول المحدود"
ملخص الرسالة بالعربي258.77 kBAdobe PDFعرض/ فتح
طلب نسخة
abse24261.pdf
"   الوصول المحدود"
ملخص الرسالة بالإنجليزي245.81 kBAdobe PDFعرض/ فتح
طلب نسخة
cont24261.pdf
"   الوصول المحدود"
فهرس الموضوعات278.32 kBAdobe PDFعرض/ فتح
طلب نسخة
indu24261.pdf
"   الوصول المحدود"
المقدمة417.44 kBAdobe PDFعرض/ فتح
طلب نسخة
title24261.PDF
"   الوصول المحدود"
غلاف183.65 kBAdobe PDFعرض/ فتح
طلب نسخة
اضف إلى مراجعى الاستشهاد المرجعي طلب رقمنة مادة

تعليقات (0)



جميع الأوعية على المكتبة الرقمية محمية بموجب حقوق النشر، ما لم يذكر خلاف ذلك