On the post-quantum future of Elliptic Curve Cryptography
| dc.contributor.author | Lucaroni, Rayen | |
| dc.contributor.department | fi=Matematiikan ja tilastotieteen laitos|en=Department of Mathematics and Statistics| | |
| dc.contributor.faculty | fi=Matemaattis-luonnontieteellinen tiedekunta|en=Faculty of Science| | |
| dc.contributor.studysubject | fi=Sovellettu matematiikka|en=Applied Mathematics| | |
| dc.date.accessioned | 2023-05-25T21:07:04Z | |
| dc.date.available | 2023-05-25T21:07:04Z | |
| dc.date.issued | 2023-05-22 | |
| dc.description.abstract | This thesis is a literature study on current published quantum-resistant isogeny-based key exchange protocols. Here we cover the topic from foundations. Chapters 1 and 2 discuss classical computation models, algorithm complexity, and how these concepts support the security of modern elliptic curve cryptography methods, such as ECDH and ECDSA. Next, in Chapters 3 to 5, we present quantum computation models, and how Shor's algorithm on quantum computers presents a threat to the future security of classical asymmetric cryptography. We explore the foundations of isogeny-based cryptography, and two key exchange protocols of this kind: SIDH and CSIDH. Appendices A and B are provided for readers wanting more in-depth background explanations on the algebraic geometry of elliptic curves, and quantum mechanics respectively. | |
| dc.format.extent | 66 | |
| dc.identifier.olddbid | 191980 | |
| dc.identifier.oldhandle | 10024/175061 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/17742 | |
| dc.identifier.urn | URN:NBN:fi-fe2023052548123 | |
| dc.language.iso | eng | |
| dc.rights | fi=Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.|en=This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.| | |
| dc.rights.accessrights | avoin | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/175061 | |
| dc.subject | cryptography, isogeny-based cryptography, elliptic curves, ECDH, ECDSA, quantum computing, Shor's algorithm, key exchange SIDH, CSIDH | |
| dc.title | On the post-quantum future of Elliptic Curve Cryptography | |
| dc.type.ontasot | fi=Diplomityö|en=Master's thesis| |
Tiedostot
1 - 1 / 1
Ladataan...
- Name:
- MSc_Thesis_Rayen_Lucaroni.pdf
- Size:
- 946.23 KB
- Format:
- Adobe Portable Document Format