Analysis of implementations of ECC libraries – Bc. David Hofman
Bc. David Hofman
Master's thesis
Analysis of implementations of ECC libraries
Analysis of implementations of ECC libraries
Abstract:
Implementace kryptografie eliptických křivek (ECC) je obtížná. Ve mnoha populárních kryptografických knihovnách byly v minulosti nalezeny chyby. Tyto chyby mohou vyústit ve zneužitelné zranitelnosti. V rámci této práce bylo do ECTesteru – nástroje pro testování a analýzu implementací ECC – přidáno jedenáct nových sad testů, které umožňují důkladnější testování podporovaných kryptografických knihoven …moreAbstract:
Implementing elliptic curve cryptography (ECC) is a difficult task, and many of the popular cryptographic libraries have a history of containing errors. These errors can result in exploitable vulnerabilities. As a part of this thesis, eleven new test suites were added to ECTester – a tool for testing and analyzing ECC implementations – so that they would allow for more thorough testing of the supported …more
Language used: English
Date on which the thesis was submitted / produced: 14. 12. 2021
Identifier:
https://is.muni.cz/th/bsc8v/
Thesis defence
- Date of defence: 2. 2. 2022
- Supervisor: doc. RNDr. Petr Švenda, Ph.D.
- Reader: Mgr. Marek Sýs, Ph.D.
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsMaster programme / field:
Computer systems, communication and security / Software systems
Theses on a related topic
-
Exemining and improving the security of elliptic curve cryptography
Vladimír Sedláček -
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Andrej Bátora -
PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels
Ján Jančár -
Designing Optimized Architecture for Solving Elliptic Curve Discrete Log Problem Using Pollard's rho method
Harshit Kumar Singh -
Security considerations for elliptic curve domain parameters selection
Ján Jančár -
Cycles of pairing-friendly elliptic curves and their applications in cryptography
Tomáš Novotný -
Cryptographic Packages in Java Micro Edition
Filip Jurnečka