D-Library Repositry

//uquui/

Reports Community

Annual Report Collection

 2020

 تحسين سرعة بروتوكول تبادل المفاتيح Diffie-Hellman المستند إلى تناسق التماثل الفائق ما بعد الكم

 Abdallah, Saeed Ali Balubaid


//uquui/handle/20.500.12248/130826
Full metadata record
DC FieldValueLanguage
dc.contributor.adviserAl-Somani, Turki-
dc.contributor.authorAbdallah, Saeed Ali Balubaid-
dc.date.accessioned2021-09-01T06:48:16Z-
dc.date.available2021-09-01T06:48:16Z-
dc.date.issued2020en_US
dc.identifier.urihttp://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130826-
dc.description66 ورقة.en_US
dc.description.abstractSuper singular Isogeny-based Diffie-Hellman (SIDH) key exchange protocol has recently gained an increasing attraction and is considered as a good candidate of the post-quantum algorithms family. As of today, the best-known algorithms against the SIDH protocol have an exponential time complexity for both classical and quantum attackers. The core of SIDH built with the elliptic curve cryptography (ECC) which is a public key encryption method based on elliptic curve. In a typical elliptic curve cryptosystem, elliptic curve point multiplication is the most computationally expensive component. In other words, it’s also called scalar multiplication which is quite computationally expensive. Therefore, it is more attractive to implement the ECC with their scalar multiplication operations in faster way. In this thesis, we propose a faster scalar multiplication of the implementation the elliptic curve point multiplication in binary Galois field GF(2^m). Experimental results demonstrate that the proposed approach which is called here the Reference Point Array (RPA), The implementation can speed up the elliptic curve scalar multiplication by 25.2% better than other’s implementations, that saved time and enhancement caused by the number of saved doubles, This because using the advantage of RPA. We have simulated the proposed approach of the elliptic curve point multiplication using Java programming language and Implemented it on High-end Intel Core i7-7500U @ 2.9Ghz. The platform used is NetBeans IDE version 8.2 as research programming environment for simulating our proposed approach. Keywords: Elliptic Curve, Cryptography, Public Key Encryption, ECC, Symmetric Cryptography, Information Security, Scalar Multiplication, Point Multiplication, Cryptosystems, Key Exchange.en_US
dc.language.isoانجليزيen_US
dc.publisherجامعة أم القرىen_US
dc.relation.isformatofمكتبة الملك عبدالله بن عبدالعزيز الجامعيةen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer and engineeringen_US
dc.titleتحسين سرعة بروتوكول تبادل المفاتيح Diffie-Hellman المستند إلى تناسق التماثل الفائق ما بعد الكمen_US
dc.title.alternativeImproving the Speed of The Post-Quantum Supersingular Isogeny-Based Diffie-Hellman Key Exchange Protocolen_US
dc.identifier.callnum24261-
dc.type.formatماجستيرen_US
dc.publisher.countryالمملكة العربية السعوديةen_US
dc.relation.collageالحاسب الآلي ونظم المعلوماتen_US
dc.type.statusمجازen_US
dc.rights.holdYesen_US
dc.rights.digitalYesen_US
dc.publisher.cityمكة المكرمةen_US
dc.date.issuedhijri1441en_US
dc.relation.depهندسة نظم المعلوماتen_US
dc.rights.digitizedYesen_US
Appears in Collections :الرسائل العلمية المحدثة

Files in This Item :
File Description SizeFormat 
24261.pdf
"   Restricted Access"
الرسالة الكاملة1.39 MBAdobe PDFView/Open
Request a copy
absa24261.pdf
"   Restricted Access"
ملخص الرسالة بالعربي258.77 kBAdobe PDFView/Open
Request a copy
abse24261.pdf
"   Restricted Access"
ملخص الرسالة بالإنجليزي245.81 kBAdobe PDFView/Open
Request a copy
cont24261.pdf
"   Restricted Access"
فهرس الموضوعات278.32 kBAdobe PDFView/Open
Request a copy
indu24261.pdf
"   Restricted Access"
المقدمة417.44 kBAdobe PDFView/Open
Request a copy
title24261.PDF
"   Restricted Access"
غلاف183.65 kBAdobe PDFView/Open
Request a copy

Comments (0)



Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.