Analysis and implementation of secure lightweight crypto algorithm

dc.contributor.guideEdna Elizabeth N
dc.coverage.spatialAnalysis and implementation of secure lightweight crypto algorithm
dc.creator.researcherRenita J
dc.date.accessioned2023-11-17T11:58:01Z
dc.date.available2023-11-17T11:58:01Z
dc.date.awarded2023
dc.date.completed2023
dc.date.registered
dc.description.abstractRecent advancement in cryptographic technologies is being newlineextensively studied because of their focus on new techniques for design, newlineimplementation and attacks. One such advancement is Lightweight newlineCryptography (LWC) where the crypto algorithm is designed in such a newlinemanner that it can be implemented in any constrained environment. This newlineresearch work is an extensive study of an asymmetric LWC algorithm called newlineElliptic Curve Cryptography (ECC). This crypto algorithm operates over newlineelliptic curves and can be used in key exchange as well as a digital signature newlinefor authentication. In this work, the implementation, analysis, optimization newlineand security aspects of the crypto algorithm are presented. Since elliptic curve newlinealgorithms are lightweight, they can be used in the Internet of Things (IoT) newlinelike RFIDs, Vehicle On-Board Units (OBU) etc. newlineThe work starts with a basic introduction to cryptography and the newlineimportance of lightweight cryptography. The significance of elliptic curve newlinecryptography is given and the mathematical background behind the crypto newlinealgorithm is discussed. An extensive survey of the various literature works newlinethat focus on different aspects of ECC was done and the detailed study helps newlinein narrowing down the area of the research work. This is followed by the newlineimplementation of asymmetric crypto algorithms to study their performance newlineanalysis and how ECC outperforms the other crypto algorithms to fit newlinelightweight applications. The implementation is then analysed and several newlineoptimization techniques have been studied. Then the multiplier used in the newlineECC crypto algorithm is studied followed by selecting an efficient multiplier. newline
dc.description.note
dc.format.accompanyingmaterialNone
dc.format.dimensions21cm.
dc.format.extentxix,158p.
dc.identifier.urihttp://hdl.handle.net/10603/526293
dc.languageEnglish
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.relationp147-157
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordCrypto Algorithm
dc.subject.keywordElliptic Curve Cryptography
dc.subject.keywordLightweight Cryptography
dc.titleAnalysis and implementation of secure lightweight crypto algorithm
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 11
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
227.14 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_prelim pages.pdf
Size:
2.63 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_contents.pdf
Size:
384.29 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstracts.pdf
Size:
227.44 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter1.pdf
Size:
938.78 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: