Why i need to learn so much math for my phd research
Upcoming SlideShare
Loading in...5

Why i need to learn so much math for my phd research






Total Views
Views on SlideShare
Embed Views



1 Embed 5

https://twitter.com 5



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Why i need to learn so much math for my phd research Why i need to learn so much math for my phd research Presentation Transcript

  • Why I need to learn so muchmath for my PhD research Marisa W. Paryasto School of Electrical Engineering and Informatics ITB July 23rd, 2009
  • My Researchq  Title: Elliptic Curve Cryptography Algorithm Implementation and Design for Constrained Devicesq  Target: Make it fits constrained devices [constrained devices = some tiny little spaces about 1mm2]
  • Math Foundation neededq  Number Theory q  Finite Fieldsq  Algebra ⣄  Basic Properties ⣄  Groups ⣄  Field Extensions ⣄  Rings ⣄  Roots of ⣄  Fields Irreducible Polynomials ⣄  Polynomial ⣄  Bases of Finite Fields ⣄  Finite Fields GF (2m)
  • What is Elliptic Curve Cryptography?q  Point multiplication Q = kPq  Repeated point addition and doubling: 9P = 2(2(2P)) + Pq  Public key operation: Q(x,y) = kP(x,y) Q = public key P = base point (curve parameter) k = private key n = order of Pq  Elliptic curve discrete logarithm Given public key kP, find private key kq  Best known attack: Pollard s rho method with running time: ((πn)½))/2
  • Hierarchical Model for Elliptic Curve Cryptography
  • Research Questionsq  Implementing ECC is not simple. Especially in constrained devices.q  How do you know that it s secure and being implemented securely?
  • More problemsq  There is no guide yet for implementing ECC efficientlyq  There is no tools to predict certain configurations of ECC and its level of security
  • Hypothesisq  There is exist some (generic) algorithm to implement ECC.q  Different implementation algorithms determine different level of security. (Notes: metric of security?)
  • Methods (to solve the problems)q  Improve an architecture to be resistance against side channel attacks ⣄  Asynchronous circuits implementationq  Develop a configurable, integrated ECC modules (to measure security/ efficiency/space/speed)
  • Contribution Efficient software Attack of ECC Hardware implementati hardware Efficient implementati on of ECC/ implementatiimplementati on of ECC on Reconfigurabl on on on of ECC constrained e ECC constrained devices implementati device on basis various   smart attack conversion library circuit algorithm     synthesis math software hardware math / foundation