Elliptic curve cryptography and related secrecy systems

dc.contributor.authorMkhatshwa, Nokuzola
dc.date.accessioned2023-02-20T09:16:51Z
dc.date.available2023-02-20T09:16:51Z
dc.date.issued2022
dc.descriptionA dissertation submitted in fulfilment of the requirements for the degree of Master of Science to the Faculty of Science, School of Mathematics, University of the Witwatersrand, Johannesburg, 2022
dc.description.abstractIn this dissertation, we discuss pre- and post-quantum cryptography. The Di e-Hellman key-exchange protocol is known as the foundation of public key cryptography. Public-key cryptography is widely used, Elliptic Curve Cryptography (ECC) in particular. But there is a problem: quantum computers. In 1999, Peter Shor introduced a quantum algorithm that posed a great threat to public-key cryptosystems. However, isogeny-based cryptography is not vulnerable to Shor's algorithm, hence isogeny-based cryptosystems attempts to mitigate the threats posed by quantum computers. This dissertation will review ECC, review mappings between elliptic curves (isogenies), and then show an isogeny-based, quantum-resistant version of the Di e-Hellman key-exchange protocol.
dc.description.librarianTL (2023)
dc.facultyFaculty of Science
dc.identifier.urihttps://hdl.handle.net/10539/34606
dc.language.isoen
dc.schoolSchool of Mathematics
dc.titleElliptic curve cryptography and related secrecy systems
dc.typeDissertation
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Mkhatshwa_729117_MSCfinalsubmission.pdf
Size:
889.4 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.43 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections