On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography

In this work, we present the theory behind Elliptic Curve Cryptography (ECC) and Isogeny-based cryptography. We start with a quick introduction to Complexity Theory and Cryptography. We give a detailed description of elliptic curves and discuss how they are used to create secure protocols. We presen...

全面介绍

Saved in:
书目详细资料
主要作者: Caamaño Mayorga, Renzo Sebastián (author)
格式: bachelorThesis
语言:eng
出版: 2021
主题:
在线阅读:http://repositorio.yachaytech.edu.ec/handle/123456789/304
标签: 添加标签
没有标签, 成为第一个标记此记录!
_version_ 1863534789413306368
author Caamaño Mayorga, Renzo Sebastián
author_facet Caamaño Mayorga, Renzo Sebastián
author_role author
collection Repositorio Universidad Yachay Tech
dc.contributor.none.fl_str_mv Anton Castro, Francesc
dc.creator.none.fl_str_mv Caamaño Mayorga, Renzo Sebastián
dc.date.none.fl_str_mv 2021-05-18T22:15:41Z
2021-05-18T22:15:41Z
2021-04
dc.format.none.fl_str_mv application/pdf
dc.identifier.none.fl_str_mv http://repositorio.yachaytech.edu.ec/handle/123456789/304
dc.language.none.fl_str_mv eng
dc.publisher.none.fl_str_mv Universidad de Investigación de Tecnología Experimental Yachay
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Yachay Tech
instname:Universidad Yachay Tech
instacron:Yachay
dc.subject.none.fl_str_mv Curvas elípticas
Isogenias
Criptosistemas de clave pública cuántico-resistentes
Algoritmo de Shor
Elliptic curves
Isogenies
Quantum-resistant public-key cryptosystems
Shor's Algorithm
dc.title.none.fl_str_mv On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description In this work, we present the theory behind Elliptic Curve Cryptography (ECC) and Isogeny-based cryptography. We start with a quick introduction to Complexity Theory and Cryptography. We give a detailed description of elliptic curves and discuss how they are used to create secure protocols. We present the strength of this scheme and also its weaknesses regarding quantum computation. To show the necessity for other protocols, we review some basic concepts of Quantum Computing and present how Shor's Quantum Algorithm breaks ECC. Then, we survey the rich theory of isogenies between ordinary and supersingular elliptic curves to end with cryptographic protocols, that use these isogenies to create post-quantum cryptographic systems.
eu_rights_str_mv openAccess
format bachelorThesis
id Yachay_7bf9030d3e4fc60a3361a82e8e2b9d29
instacron_str Yachay
institution Yachay
instname_str Universidad Yachay Tech
language eng
network_acronym_str Yachay
network_name_str Repositorio Universidad Yachay Tech
oai_identifier_str oai:repositorio.yachaytech.edu.ec:123456789/304
publishDate 2021
publisher.none.fl_str_mv Universidad de Investigación de Tecnología Experimental Yachay
reponame_str Repositorio Universidad Yachay Tech
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Yachay Tech - Universidad Yachay Tech
repository_id_str 10284
spelling On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based CryptographyCaamaño Mayorga, Renzo SebastiánCurvas elípticasIsogeniasCriptosistemas de clave pública cuántico-resistentesAlgoritmo de ShorElliptic curvesIsogeniesQuantum-resistant public-key cryptosystemsShor's AlgorithmIn this work, we present the theory behind Elliptic Curve Cryptography (ECC) and Isogeny-based cryptography. We start with a quick introduction to Complexity Theory and Cryptography. We give a detailed description of elliptic curves and discuss how they are used to create secure protocols. We present the strength of this scheme and also its weaknesses regarding quantum computation. To show the necessity for other protocols, we review some basic concepts of Quantum Computing and present how Shor's Quantum Algorithm breaks ECC. Then, we survey the rich theory of isogenies between ordinary and supersingular elliptic curves to end with cryptographic protocols, that use these isogenies to create post-quantum cryptographic systems.En este trabajo, presentamos la teoría detrás de la criptografía de curva elíptica (ECC) y la criptografía basada en isogenia. Comenzamos con una rápida introducción a la teoría de la complejidad y la criptografía. Damos una descripción detallada de las curvas elípticas y discutimos como se utilizan para crear protocolos seguros. Presentamos la fortaleza de este esquema y también sus debilidades con respecto a la computación cuántica. Para mostrar la necesidad de otros protocolos, revisamos algunos conceptos básicos de Computación Cuántica y presentamos como el algoritmo cuántico de Shor rompe ECC. A partir de entonces, examinamos la rica teoría de las isogenias entre las curvas elípticas ordinarias y supersingulares para terminar con protocolos criptográficos que utilizan estas isogenias para crear sistemas criptográficos post-cuánticos.Matemático/aUniversidad de Investigación de Tecnología Experimental YachayAnton Castro, Francesc2021-05-18T22:15:41Z2021-05-18T22:15:41Z2021-04info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisapplication/pdfhttp://repositorio.yachaytech.edu.ec/handle/123456789/304enginfo:eu-repo/semantics/openAccessreponame:Repositorio Universidad Yachay Techinstname:Universidad Yachay Techinstacron:Yachay2025-07-08T17:51:49Zoai:repositorio.yachaytech.edu.ec:123456789/304Institucionalhttps://repositorio.yachaytech.edu.ec/Universidad públicahttps://www.yachaytech.edu.ec/https://repositorio.yachaytech.edu.ec/oaiEcuador...opendoar:102842025-07-08T17:51:49falseInstitucionalhttps://repositorio.yachaytech.edu.ec/Universidad públicahttps://www.yachaytech.edu.ec/https://repositorio.yachaytech.edu.ec/oai.Ecuador...opendoar:102842025-07-08T17:51:49Repositorio Universidad Yachay Tech - Universidad Yachay Techfalse
spellingShingle On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
Caamaño Mayorga, Renzo Sebastián
Curvas elípticas
Isogenias
Criptosistemas de clave pública cuántico-resistentes
Algoritmo de Shor
Elliptic curves
Isogenies
Quantum-resistant public-key cryptosystems
Shor's Algorithm
status_str publishedVersion
title On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
title_full On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
title_fullStr On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
title_full_unstemmed On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
title_short On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
title_sort On the theory, design and optimization of Classical and Quantum algorithms for Isogeny-based Cryptography
topic Curvas elípticas
Isogenias
Criptosistemas de clave pública cuántico-resistentes
Algoritmo de Shor
Elliptic curves
Isogenies
Quantum-resistant public-key cryptosystems
Shor's Algorithm
url http://repositorio.yachaytech.edu.ec/handle/123456789/304