Elliptic curve cryptography and related secrecy systems

Date
2022
Authors
Mkhatshwa, Nokuzola
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
In this dissertation, we discuss pre- and post-quantum cryptography. The Di e-Hellman key-exchange protocol is known as the foundation of public key cryptography. Public-key cryptography is widely used, Elliptic Curve Cryptography (ECC) in particular. But there is a problem: quantum computers. In 1999, Peter Shor introduced a quantum algorithm that posed a great threat to public-key cryptosystems. However, isogeny-based cryptography is not vulnerable to Shor's algorithm, hence isogeny-based cryptosystems attempts to mitigate the threats posed by quantum computers. This dissertation will review ECC, review mappings between elliptic curves (isogenies), and then show an isogeny-based, quantum-resistant version of the Di e-Hellman key-exchange protocol.
Description
A dissertation submitted in fulfilment of the requirements for the degree of Master of Science to the Faculty of Science, School of Mathematics, University of the Witwatersrand, Johannesburg, 2022
Keywords
Citation
Collections