Browsing by Author "TURKI FAISAL AL-SOMANI"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Restricted Design and analysis of efficient and secure elliptic curve cryptoprocessors(Saudi Digital Library) TURKI FAISAL AL-SOMANIﻟﻘﺪ ﺟﺬﺑﺖ أﻧﻈﻤﺔ اﻟﺘﺸﻔﻴﺮ اﻟﻤﺒﻨﻴﺔ ﻋﻠﻰ اﻟﻤﻨﺤﻨﻴﺎت اﻟﺒﻴﻀﺎوﻳﺔ اه آﻤﺎ أﻧﻬﺎ ، ﺘﻤﺎم اﻟﻜﺜﻴﺮ ﻣﻦ اﻟﺒﺎﺣﺜﻴﻦ ُّﺿﻤﻨﺖ ﻓﻲ آﺜﻴﺮ ﻣﻦ اﻟﻤﻮاﺻﻔﺎت اﻟﻘﻴﺎﺳﻴﺔ .ﺑﺎﻹﺿﺎﻓ إن اﺳﺘﺨﺪام ﻣﻔﺎﺗﻴﺢ ذات أﻃﻮال ﻗﺼﻴﺮة ﺔ إﻟﻰ اﺳﺘﺨﺪام ﺧﻮارزﻣﻴﺎت أآﺜﺮ ﻓﻌﺎﻟﻴﺔ ﻣﻦ اﻟﻤﺴﺘﺨﺪﻣﺔ ﺳﺎﺑﻘًﺎ ﻓﻲ أﻧﻈﻤﺔ اﻟﺘﺸﻔﻴﺮ ذات اﻟﻤﻔﺘﺎح اﻟﻌﻤﻮﻣﻲ هﻤﺎ اﻷﺳﺒﺎب اﻟﺮﺋﻴﺴﺔ ﺟﻌﻞ أﻧﻈﻤﺔ اﻟﺘﺸﻔﻴﺮ اﻟﻤﺒﻨﻴﺔ ﻋﻠ ﺷﻌﺒﻴﺔ ﻰ اﻟﻤﻨﺤﻨﻴﺎت اﻟﺒﻴﻀﺎوﻳﺔ أآﺜﺮ . ﺗﻌﺪ هﺬﻩ اﻷﻧﻈﻤﺔ وﻟﻜﻦ اﻟﻬﺠﻤﺎت اﻟﻘﺪرة ، ﻣﻨﺎﺳﺒﺔ ﻟﻠﺘﻨﻔﻴﺬ ﻋﻠﻰ اﻟﺒﻄﺎﻗﺎت اﻟﺬآﻴﺔ واﻷﺟﻬﺰة اﻟﻨﻘﺎﻟﺔ ﺑﺎﺳﺘﺨﺪام ﺗﺤﻠﻴﻞ ﻋﻠﻰ ﻣﺜﻞ آﻤﺎ أن ﻋﺪم اﻻهﺘﻤﺎم ﺑﻬﺬﻩ ، هﺬﻩ اﻷﺟﻬﺰة ﻳﺸﻜﻞ ﺧﻄﺮًا ﺣﻘﻴﻘﻴًﺎ ﻋﻨﺪ اﺳﺘﺨﺪاﻣﻬﺎ ﻓﻲ ﺑﻴﺌﺎت ﻏﻴﺮ ﺁﻣﻨﺔ اﻟﻬﺠﻤﺎت ﻗﺪ ﻳﺠﻌﻞ اﻟﻤﻔﺎﺗﻴﺢ اﻟﺴ اﻟﺘﺨﻤﻴﻦ ﺮﻳﺔ ﻗﺎﺑﻠﺔ ﻟﻼﺳﺘﻨﺘﺎج أو .ﺗﻘﺪم اﻟﺪآﺘﻮراﻩ رﺳﺎﻟﺔ هﺬﻩ ﻣﻌﺎﻟﺠﺎت ﺑﻨﻴﺔ ﻋﻠﻰ اﻟﻤﻨﺤﻨﻴﺎت اﻟﺒﻴﻀﺎوﻳﺔ ﻓّﻌﺎﻟﺔ وﺁﻣﻨﺔ اﻟﻘﺪرة ، ﺿﺪ هﺠﻤﺎت ﺗﺤﻠﻴﻞ وﺗ ﻘﻮم ﺑﺎﻗﺘﺮاح ﺑﻨﻴﺎت ﻟﻤﻌﺎﻟﺠﺎت و ذﻟﻚ ﻣﻦ ﺧﻼل اﺳﺘﺜﻤﺎر ، ذات آﻔﺎءة ﻋﺎﻟﻴﺔ ﻓﻲ ﺣﺴﺎب ﻋﻤﻠﻴﺔ ﺿﺮب اﻟﻨﻘﺎط ﻋﻠﻰ اﻟﻤﻨﺤﻨﻴﺎت اﻟﺒﻴﻀﺎوﻳﺔ ﺑﺄن ، اﻟﺒﻨﻴﺎت اﻟﻤﺘﻮازﻳﺔ واﻟﺒﻨﻴﺎت اﻟﻌﺸﻮاﺋﻴﺔ اﻟﻘﺎﺑﻠﺔ ﻹﻋﺎدة إﻋﺪاد اﻟﺒﻨﻴﺔ ﻋﻠﻤًﺎ اﻟﺘﺤﻜﻢ ﻓﻲ اﻟﺘﻮازي واﻟﻌﺸﻮاﺋﻴﺔ هﻮ ﻋﻠﻰ ﻣﺴﺘﻮى ﺧﻮارزﻣﻴﺎت ﺿﺮب اﻟﻨﻘﺎط آﻤﺎ أن ﺑﻨﻴﺎت ، ﻋﻠﻰ اﻟﻤﻨﺤﻨﻴﺎت اﻟﺒﻴﻀﺎوﻳﺔ اﻟﻤﻌﺎﻟﺠﺎت اﻟﻤﻘﺘﺮﺣﺔ ﺗﻌﻄﻲ اﻟﻤﺼﻤﻤﻴﻦ اﻟﺤﺮﻳﺔ ﻓﻲ ﺗﻘﻨﻴﻦ اﻷداء وﻣﺘﻄﻠﺒﺎت اﻷﺟﻬﺰة واﻟﻤﻌﺪات وﻓﻘًﺎ ﻟﺘﻜﻠﻔﺔ اﻷهﺪاف3 0Item Restricted Design and analysis of efficient and secure elliptic curve cryptoprocessors.(Saudi Digital Library) TURKI FAISAL AL-SOMANIElliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. They are considered to be particularly suitable for implementation on smart cards or mobile devices. Power Analysis Attacks on such devices are considered serious threat due to the physical characteristics of these devices and their use in potentially hostile environments. This dissertation investigates elliptic curve cryptoprocessor architectures for curves defined over GF(2m) fields. In this dissertation, new architectures that are suitable for efficient computation of scalar multiplications with resistance against power analysis attacks are proposed and their performance evaluated. This is achieved by exploiting parallelism and randomized processing techniques. Parallelism and randomization are controlled at different levels to provide more efficiency and security. Furthermore, the proposed architectures are flexible enough to allow designers tailor performance and hardware requirements according to their performance and cost objectives. The proposed architectures have been modeled using VHDL and implemented on FPGA platform.0 0