Show simple item record

dc.contributor.authorFishbein, Dieter
dc.date.accessioned2014-04-30 20:14:44 (GMT)
dc.date.available2014-04-30 20:14:44 (GMT)
dc.date.issued2014-04-30
dc.date.submitted2014
dc.identifier.urihttp://hdl.handle.net/10012/8400
dc.description.abstractThis work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange protocol proposed by Jao et al.. As the use of mobile devices increases, the deployment of practical cryptographic protocols designed for use on these devices is of increasing importance. Furthermore, we are faced with the possible development of a large-scale quantum computer in the near future and must take steps to prepare for this possibility. We describe the key-exchange protocol of Jao et al. and discuss their original implementation. We then describe our modifications to their scheme that make it suitable for use in mobile devices. Our code is between 18-26% faster (depending on the security level). The second is an highly optimized implementation of Miller's algorithm that efficiently computes the Optimal Ate pairing over Barreto-Naehrig curves proposed by Grewal et al.. We give an introduction to cryptographic pairings and describe the Tate pairing and its variants. We then proceed to describe Grewal et al.'s implementation of Miller's algorithm, along with their optimizations. We describe our use of hand-optimized assembly code to increase the performance of their implementation. For the Optimal Ate pairing over the BN-446 curve, our code is between 7-8% faster depending on whether the pairing uses affine or projective coordinates.en
dc.language.isoenen
dc.publisherUniversity of Waterlooen
dc.subjectcryptographyen
dc.subjectcryptologyen
dc.subjectkey-exchangeen
dc.subjectpairingsen
dc.subjectBN-curvesen
dc.subjectisogeniesen
dc.subjectelliptic curvesen
dc.subjectTate pairingen
dc.subjectOptimal Ate pairingen
dc.subjectmobile devicesen
dc.subjectpost-quantum cryptographyen
dc.subjectassembly languageen
dc.titleMachine-Level Software Optimization of Cryptographic Protocolsen
dc.typeMaster Thesisen
dc.pendingfalse
dc.subject.programCombinatorics and Optimizationen
uws-etd.degree.departmentCombinatorics and Optimizationen
uws-etd.degreeMaster of Mathematicsen
uws.typeOfResourceTexten
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages