Cryptanalysis of elliptic curve scalar multiplication algorithms

This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. Scalar multiplication is the most computationally intensive operation...

Full description

Saved in:
Bibliographic Details
Main Author: Leong, Zhen Hong
Format: Final Year Project / Dissertation / Thesis
Published: 2025
Subjects:
Online Access:http://eprints.utar.edu.my/6105/1/fyp_CN_2025_LZH.pdf
http://eprints.utar.edu.my/6105/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1848452678003195904
author Leong, Zhen Hong
author_facet Leong, Zhen Hong
author_sort Leong, Zhen Hong
building UTAR Library
collection Institutional Repository
content_provider Universiti Tunku Abdul Rahman
content_source UTAR Institutional Repository
continent Asia
country Malaysia
description This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. Scalar multiplication is the most computationally intensive operation in Elliptic Curve Cryptography and directly impacts both cryptographic strength and performance. There is lack of standardized scalar multiplication algorithm or parameter set to ensure compatibility and interoperability in cryptographic implementations. This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. In contrast, the elliptic net method structures point operations more uniformly, reducing observable patterns and improving leakage resistance despite its higher complexity. Simulated attack scenarios, including timing and power analysis, revealed that the elliptic net method maintained more consistent behavior and offered better protection against information leakage. Overall, the findings highlighted the performance of Elliptic Curve Cryptography Scalar Multiplications over side-channel attacks in the implementations.
format Final Year Project / Dissertation / Thesis
id my-utar-eprints.6105
institution Universiti Tunku Abdul Rahman
publishDate 2025
record_format eprints
spelling my-utar-eprints.61052025-11-05T11:56:48Z Cryptanalysis of elliptic curve scalar multiplication algorithms Leong, Zhen Hong T Technology (General) TD Environmental technology. Sanitary engineering This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. Scalar multiplication is the most computationally intensive operation in Elliptic Curve Cryptography and directly impacts both cryptographic strength and performance. There is lack of standardized scalar multiplication algorithm or parameter set to ensure compatibility and interoperability in cryptographic implementations. This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. In contrast, the elliptic net method structures point operations more uniformly, reducing observable patterns and improving leakage resistance despite its higher complexity. Simulated attack scenarios, including timing and power analysis, revealed that the elliptic net method maintained more consistent behavior and offered better protection against information leakage. Overall, the findings highlighted the performance of Elliptic Curve Cryptography Scalar Multiplications over side-channel attacks in the implementations. 2025-01 Final Year Project / Dissertation / Thesis NonPeerReviewed application/pdf http://eprints.utar.edu.my/6105/1/fyp_CN_2025_LZH.pdf Leong, Zhen Hong (2025) Cryptanalysis of elliptic curve scalar multiplication algorithms. Final Year Project, UTAR. http://eprints.utar.edu.my/6105/
spellingShingle T Technology (General)
TD Environmental technology. Sanitary engineering
Leong, Zhen Hong
Cryptanalysis of elliptic curve scalar multiplication algorithms
title Cryptanalysis of elliptic curve scalar multiplication algorithms
title_full Cryptanalysis of elliptic curve scalar multiplication algorithms
title_fullStr Cryptanalysis of elliptic curve scalar multiplication algorithms
title_full_unstemmed Cryptanalysis of elliptic curve scalar multiplication algorithms
title_short Cryptanalysis of elliptic curve scalar multiplication algorithms
title_sort cryptanalysis of elliptic curve scalar multiplication algorithms
topic T Technology (General)
TD Environmental technology. Sanitary engineering
url http://eprints.utar.edu.my/6105/1/fyp_CN_2025_LZH.pdf
http://eprints.utar.edu.my/6105/
url_provider http://eprints.utar.edu.my