Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/182215
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2017-11-21T09:43:03Z-
dc.date.available2017-11-21T09:43:03Z-
dc.identifier.urihttp://hdl.handle.net/10603/182215-
dc.description.abstractThe thesis addresses the security and performance dvancement for the Discrete Logarithmic Problem DLP in the following primitives of cryptography such as: Elliptic Curve Cryptography ECC Edwards and twisted Edwards Curves Noncommutative Cryptography NCC multilayer key generation for ECC using signcryption and proxy re- newline ryptographic approach. newlineThese entire primitive formulates into the following five objectives The first objective claims Radix-16 scalar multiplication without pre-computations for ECC. newlineUsing the designed hardware support the proposed claim shows the more appropriateness for reduced instruction set computing and is a particular suite for low memory devices with resistance to the simple side channel attack and safe-error fault attack. This is in theoretically computing 6.25 percent faster than the recently proposed Radix-8 scalar conversion technique without pre-computed operations. The performance from the hardware perspective also improves newlineby 8.33 percent. newline newlineThe second objective works on the architecture of prime Edwards curves and extended Twisted Edwards curves on 4-processors and 8-processors. The proposed scalar multiplication results for both the curves are available on the reduced clock cycles and in a reduced newlinemultiplication processing costs. newline newlineThe third objective pertains on Noncommutative Cryptography NCC which is truly a fascinating area with great hope of advancing performance and security for high end newlineapplications. It provides a high level of safety measures. The basis of this group is established on the Hidden subgroup or subfield problem HSP. A proposed scheme is based on the extra special group ESG for finding the solution of an open problem for the most appropriate Noncommutative platform. This ESG supports at Heisenberg Dihedral order and Quaternion group. The working principle is made possible on the random polynomials chosen by the communicating parties for secure key-exchange encryption-decryption and authentication schemes on NCC.
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleOn Security and Performance in ECC Noncommutative Cryptography and Signcryption
dc.title.alternative
dc.creator.researcherKumar, Gautam
dc.subject.keywordAVISPA
dc.subject.keywordCrptography
dc.subject.keywordDiscrete Logarithmic
dc.subject.keywordEdwards curves
dc.subject.keywordOFMC
dc.description.note
dc.contributor.guideSaini, Hemraj
dc.publisher.placeSolan
dc.publisher.universityJaypee University of Information Technology, Solan
dc.publisher.institutionDepartment of Computer Science Engineering
dc.date.registered13/07/2013
dc.date.completed2017
dc.date.awarded18/11/2017
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File33.89 kBAdobe PDFView/Open
02_certificate.pdf537.83 kBAdobe PDFView/Open
03_table of contents.pdf651.04 kBAdobe PDFView/Open
04_chapter 1.pdf930.11 kBAdobe PDFView/Open
05_chapter 2.pdf941.95 kBAdobe PDFView/Open
06_chapter 3.pdf751.08 kBAdobe PDFView/Open
07_chapter 4.pdf1.87 MBAdobe PDFView/Open
08_chapter 5.pdf1.22 MBAdobe PDFView/Open
09_chapter 6.pdf898.16 kBAdobe PDFView/Open
10_chapter 7.pdf916.1 kBAdobe PDFView/Open
11_conclusion and future work.pdf366.42 kBAdobe PDFView/Open
12_references.pdf608.38 kBAdobe PDFView/Open
13_appendix.pdf511.3 kBAdobe PDFView/Open
14_list of publications.pdf312.11 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: