Bachelorarbeit, 2014
38 Seiten, Note: 90.00
The primary topic is an investigation into elliptic curve cryptography (ECC), including its mathematical properties, its comparison with RSA, the selection of appropriate elliptic curves, and the design of a software system to demonstrate ECC's capabilities.
The main objectives are to: Investigate the mathematical properties of elliptic curves as they relate to cryptography; Analyse ECC as an alternate to RSA; Identify and select an appropriate elliptic curve for use in a cryptosystem; Design and develop a cryptographic software system as a vehicle for this investigation.
The key themes include: Elliptic curve cryptography (ECC), RSA as a comparison, mathematical construction of elliptic curves, curve parameter selection, software implementation, and a comparison to NSA's Suite B cryptography recommendations.
The DLP is the foundation of ECC, expressed as finding an integer 'k' such that Q = kP, where k = logp(Q) and P, Q are points in (Zp).
ECC achieves a greater level of complexity than RSA in terms of resistance to attack, primarily because the DLP is considered harder than the Integer Factorization Problem upon which RSA is based. It requires much smaller keys for the equivalent security level.
A Java-based system will be developed to enable users to construct an asymmetric cipher key pair based on Elliptic Curves and use those keys to encrypt and decrypt files and text.
The project considers parameters recommended by NIST, specifically focusing on prime field curves suitable for NSA's Suite B security requirements, especially the P-384 curve.
The Bouncy Castle library is used for providing ECC functionality due to Java's limited native support for elliptic curve cryptography.
The Elliptic Curve Integrated Encryption Scheme (ECIES) is the encryption scheme utilized in the developed system.
Cipher Block Chaining is used for block encryption to enhance security. Each block depends on the Initialisation Vector (IV) and the preceding cipher block. Meaning, each block in the chain is XOR'd with the preceding block and then encrypted.
It was explicitly stated that, as the document is only a Language Preview, the reason was not provided, or included in the text. The reader would have to read the full document, or the original source document itself.
Some functional requirements are: Public/Private key pair generation, where users can enter identification information; encryption and decryption of both imported files and user-fed text; secure key ring storage and key viewing; and importing/exporting keys.
The final evaluation of the investigation found that ECC was superior in terms of security, in comparison to RSA. It was found to be a viable replacement to RSA.
The future development recommends that further steps are taken to "examine the implications of creating such protocols" to guard against future attacks.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!
Kommentare