Secure cryptographic implementations in hardware: A delicious adventure
Publication year
2021Author(s)
Publisher
S.l. : s.n.
ISBN
9789464193312
Number of pages
xxiv, 117 p.
Annotation
Radboud University, 08 november 2021
Promotor : Batina, L.
Publication type
Dissertation
Display more detailsDisplay less details
Organization
Digital Security
Subject
Digital SecurityAbstract
Cryptographic primitives are the basis for protocols that offer cryptography services, such as confidentiality, integrity, authentication, and non-repudiation. They usually require one secret key, or two keys where one is public and another private, or no keys at all.
When designing a computer system for a certain task, in most cases, it is composed of a software stack on top of third-party hardware. However, in some applications, only the hardware is sufficient or it is bundled together with the software. In the case of cryptographic primitives, they can be designed as pure hardware or software solution, or a combination of the two.
In this thesis, I will show the implementation of five different cryptographic primitives. The first two primitives operate with two keys and are based on two different problems with elliptic curves. The last three primitives require one or no keys and can directly provide confidentiality, authentication, and integrity.
This item appears in the following Collection(s)
- Academic publications [242686]
- Dissertations [13654]
- Electronic publications [129576]
- Faculty of Science [36316]
- Open Access publications [104175]
Upload full text
Use your RU credentials (u/z-number and password) to log in with SURFconext to upload a file for processing by the repository team.