Font Size: a A A

Generating secure elliptic curves over binary fields

Posted on:2010-10-01Degree:M.C.SType:Thesis
University:University of New Brunswick (Canada)Candidate:Anderson, PeterFull Text:PDF
GTID:2448390002977199Subject:Computer Science
Abstract/Summary:
Elliptic Curve Cryptography is a form of public key cryptography that offers good security and smaller key sizes then competing methods. The foundation of a secure elliptic curve cryptography system is a well-chosen curve. There are many considerations when generating a curve, the main one being its order. This is often the most costly part of an implementation of an elliptic curve cryptography system and because of this much research has been completed in this area.;This thesis has two main goals. First, to offer a solid background in the mathematics of finite fields and elliptic curves so that the reader will understand the advanced topics. Second, to explain and demonstrate the requirements for choosing a secure elliptic curve, with an emphasis on finding the order of the curve and avoiding known attacks.
Keywords/Search Tags:Elliptic curve
Related items