Secure architectures for pairing based public key cryptography

Show simple item record

dc.contributor.advisor Marnane, William P. en Pan, Weibo 2014-01-27T15:38:35Z 2014-01-27T15:38:35Z 2013 2013
dc.identifier.citation Pan, W. 2013. Secure architectures for pairing based public key cryptography. PhD Thesis, University College Cork. en
dc.identifier.endpage 187
dc.description.abstract Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated. en
dc.description.sponsorship Science Foundation Ireland (SFI/08/RFP/ENE1643) en
dc.format.mimetype application/pdf en
dc.language.iso en en
dc.publisher University College Cork en
dc.rights © 2013. Weibo Pan en
dc.rights.uri en
dc.subject Pairing en
dc.subject Public-key en
dc.subject Cryptography en
dc.subject Security en
dc.subject FPGA en
dc.subject.lcsh Public key cryptography en
dc.subject.lcsh Field programmable gate arrays en
dc.subject.lcsh Curves, Elliptic en
dc.title Secure architectures for pairing based public key cryptography en
dc.type Doctoral thesis en
dc.type.qualificationlevel Doctoral en
dc.type.qualificationname PHD (Engineering) en
dc.internal.availability Full text available en No embargo required en
dc.description.version Accepted Version
dc.contributor.funder Science Foundation Ireland en
dc.description.status Not peer reviewed en Electrical and Electronic Engineering en
dc.check.type No Embargo Required
dc.check.reason No embargo required en
dc.check.opt-out Not applicable en
dc.thesis.opt-out false
dc.check.embargoformat Not applicable en
dc.internal.conferring Autumn Conferring 2013 en

Files in this item

This item appears in the following Collection(s)

Show simple item record

© 2013. Weibo Pan Except where otherwise noted, this item's license is described as © 2013. Weibo Pan
This website uses cookies. By using this website, you consent to the use of cookies in accordance with the UCC Privacy and Cookies Statement. For more information about cookies and how you can disable them, visit our Privacy and Cookies statement