• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Why i need to learn so much math for my phd research
 

Why i need to learn so much math for my phd research

on

  • 331 views

 

Statistics

Views

Total Views
331
Views on SlideShare
326
Embed Views
5

Actions

Likes
0
Downloads
2
Comments
0

1 Embed 5

https://twitter.com 5

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Why i need to learn so much math for my phd research Why i need to learn so much math for my phd research Presentation Transcript

    • Why I need to learn so muchmath for my PhD research Marisa W. Paryasto School of Electrical Engineering and Informatics ITB July 23rd, 2009
    • My Researchq  Title: Elliptic Curve Cryptography Algorithm Implementation and Design for Constrained Devicesq  Target: Make it fits constrained devices [constrained devices = some tiny little spaces about 1mm2]
    • Math Foundation neededq  Number Theory q  Finite Fieldsq  Algebra ⣄  Basic Properties ⣄  Groups ⣄  Field Extensions ⣄  Rings ⣄  Roots of ⣄  Fields Irreducible Polynomials ⣄  Polynomial ⣄  Bases of Finite Fields ⣄  Finite Fields GF (2m)
    • What is Elliptic Curve Cryptography?q  Point multiplication Q = kPq  Repeated point addition and doubling: 9P = 2(2(2P)) + Pq  Public key operation: Q(x,y) = kP(x,y) Q = public key P = base point (curve parameter) k = private key n = order of Pq  Elliptic curve discrete logarithm Given public key kP, find private key kq  Best known attack: Pollard s rho method with running time: ((πn)½))/2
    • Hierarchical Model for Elliptic Curve Cryptography
    • Research Questionsq  Implementing ECC is not simple. Especially in constrained devices.q  How do you know that it s secure and being implemented securely?
    • More problemsq  There is no guide yet for implementing ECC efficientlyq  There is no tools to predict certain configurations of ECC and its level of security
    • Hypothesisq  There is exist some (generic) algorithm to implement ECC.q  Different implementation algorithms determine different level of security. (Notes: metric of security?)
    • Methods (to solve the problems)q  Improve an architecture to be resistance against side channel attacks ⣄  Asynchronous circuits implementationq  Develop a configurable, integrated ECC modules (to measure security/ efficiency/space/speed)
    • Contribution Efficient software Attack of ECC Hardware implementati hardware Efficient implementati on of ECC/ implementatiimplementati on of ECC on Reconfigurabl on on on of ECC constrained e ECC constrained devices implementati device on basis various   smart attack conversion library circuit algorithm     synthesis math software hardware math / foundation