Why i need to learn so much math for my phd research

10

Click here to load reader

Transcript of Why i need to learn so much math for my phd research

Page 1: Why i need to learn so much math for my phd research

Why I need to learn so much math for my PhD research

Marisa W. Paryasto School of Electrical Engineering and

Informatics ITB

July 23rd, 2009

Page 2: Why i need to learn so much math for my phd research

My Research

q  Title: Elliptic Curve Cryptography Algorithm Implementation and Design for Constrained Devices

q  Target: Make it fits constrained devices [constrained devices = some tiny little spaces about 1mm2]

Page 3: Why i need to learn so much math for my phd research

Math Foundation needed

q  Number Theory q  Algebra

⣄  Groups ⣄  Rings ⣄  Fields ⣄  Polynomial

q  Finite Fields ⣄  Basic Properties ⣄  Field Extensions ⣄  Roots of

Irreducible Polynomials

⣄  Bases of Finite Fields

⣄  Finite Fields GF(2m)

Page 4: Why i need to learn so much math for my phd research

What is Elliptic Curve Cryptography?

q  Point multiplication Q = kP q  Repeated point addition and

doubling: 9P = 2(2(2P)) + P

q  Public key operation: Q(x,y) = kP(x,y) Q = public key P = base point (curve parameter) k = private key n = order of P

q  Elliptic curve discrete logarithm Given public key kP, find private key k

q  Best known attack: Pollard’s rho method with running time: ((πn)½))/2

Page 5: Why i need to learn so much math for my phd research

Hierarchical Model for Elliptic Curve Cryptography

Page 6: Why i need to learn so much math for my phd research

Research Questions

q  Implementing ECC is not simple. Especially in constrained devices.

q  How do you know that it’s secure and being implemented securely?

Page 7: Why i need to learn so much math for my phd research

More problems

q  There is no “guide” yet for implementing ECC efficiently

q  There is no tools to predict certain configurations of ECC and its level of security

Page 8: Why i need to learn so much math for my phd research

Hypothesis

q  There is exist some (generic) algorithm to implement ECC.

q  Different implementation algorithms determine different level of security. (Notes: metric of security?)

Page 9: Why i need to learn so much math for my phd research

Methods (to solve the problems)

q  Improve an architecture to be resistance against side channel attacks ⣄  Asynchronous circuits implementation

q  Develop a configurable, integrated ECC modules (to measure security/efficiency/space/speed)

Page 10: Why i need to learn so much math for my phd research

Contribution

Efficient implementati

on of ECC

Efficient software

implementation of ECC/

Reconfigurable ECC

implementation

Hardware implementation of ECC on constrained

devices

Attack of ECC hardware

implementation on

constrained device

basis conversion

various library   smart attack

algorithm   circuit synthesis  

math software hardware math / foundation