UNIVERSITI PUTRA MALAYSIA ON THE IMPROVEMENT OF ADDITION CHAIN IN APPLICATIONS TO ELLIPTIC CURVE CRYPTOSYSTEM COPYRIGHT UPM MOHAMAD AFENDEE MOHAMED

Similar documents
UNIVERSITI PUTRA MALAYSIA

ANOLYTE SOLUTION GENERATED FROM ELECTROCHEMICAL ACTIVATION PROCESS FOR THE TREATMENT OF PHENOL

UNIVERSITI PUTRA MALAYSIA GENERATING MUTUALLY UNBIASED BASES AND DISCRETE WIGNER FUNCTION FOR THREE-QUBIT SYSTEM

COVRE OPTIMIZATION FOR IMAGE STEGANOGRAPHY BY USING IMAGE FEATURES ZAID NIDHAL KHUDHAIR

DETECTION OF STRUCTURAL DEFORMATION FROM 3D POINT CLOUDS JONATHAN NYOKA CHIVATSI UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF PROCESS-BASED ENTROPY MEASUREMENT FRAMEWORK FOR ORGANIZATIONS MAHMOOD OLYAIY

ARTIFICIAL NEURAL NETWORK AND KALMAN FILTER APPROACHES BASED ON ARIMA FOR DAILY WIND SPEED FORECASTING OSAMAH BASHEER SHUKUR

UNIVERSITI PUTRA MALAYSIA VARIABLE STEP VARIABLE ORDER BLOCK BACKWARD DIFFERENTIATION FORMULAE FOR SOLVING STIFF ORDINARY DIFFERENTIAL EQUATIONS

MULTISTAGE ARTIFICIAL NEURAL NETWORK IN STRUCTURAL DAMAGE DETECTION GOH LYN DEE

INDEX SELECTION ENGINE FOR SPATIAL DATABASE SYSTEM MARUTO MASSERIE SARDADI UNIVERSITI TEKNOLOGI MALAYSIA

ENHANCED COPY-PASTE IMAGE FORGERY DETECTION BASED ON ARCHIMEDEAN SPIRAL AND COARSE-TO-FINE APPROACH MOHAMMAD AKBARPOUR SEKEH

POSITION CONTROL USING FUZZY-BASED CONTROLLER FOR PNEUMATIC-SERVO CYLINDER IN BALL AND BEAM APPLICATION MUHAMMAD ASYRAF BIN AZMAN

COMPUTATIONAL MODELLING AND SIMULATION OF BIOMAGNETIC FLUID FLOW IN A STENOTIC AND ANEURYSMAL ARTERY NURSALASAWATI BINTI RUSLI

UNIVERSITI PUTRA MALAYSIA

UNIVERSITI PUTRA MALAYSIA EFFECT OF NON-UNIFORM TEMPERATURE GRADIENT AND MAGNETIC FIELD ON MARANGONI AND BENARD-MARANGONI CONVECTION

UNIVERSITI PUTRA MALAYSIA DIELECTRIC PROPERTIES OF STRONTIUM TITANATE AND CALCIUM TITANATE PREPARED VIA SOLID STATE AND MECHANICAL ALLOYING METHODS

UNIVERSITI PUTRA MALAYSIA CONVECTION BOUNDARY LAYER FLOWS OVER NEEDLES AND CYLINDERS IN VISCOUS FLUIDS SYAKILA BINTI AHMAD IPM

SYSTEM IDENTIFICATION MODEL AND PREDICTIVE FUNCTIONAL CONTROL OF AN ELECTRO-HYDRAULIC ACTUATOR SYSTEM NOOR HANIS IZZUDDIN BIN MAT LAZIM

EFFECTS OF Ni 3 Ti (DO 24 ) PRECIPITATES AND COMPOSITION ON Ni-BASED SUPERALLOYS USING MOLECULAR DYNAMICS METHOD

UNIVERSITI PUTRA MALAYSIA REMOVAL OF METHYL ORANGE AND METHYLENE BLUE FROM AQUEOUS SOLUTION USING DRAGON FRUIT FOLIAGE

INDIRECT TENSION TEST OF HOT MIX ASPHALT AS RELATED TO TEMPERATURE CHANGES AND BINDER TYPES AKRIMA BINTI ABU BAKAR

FRAGMENT REWEIGHTING IN LIGAND-BASED VIRTUAL SCREENING ALI AHMED ALFAKIABDALLA ABDELRAHIM

SHADOW AND SKY COLOR RENDERING TECHNIQUE IN AUGMENTED REALITY ENVIRONMENTS HOSHANG KOLIVAND UNIVERSITI TEKNOLOGI MALAYSIA

MODELING AND SIMULATION OF BILAYER GRAPHENE NANORIBBON FIELD EFFECT TRANSISTOR SEYED MAHDI MOUSAVI UNIVERSITI TEKNOLOGI MALAYSIA

BOUNDARY INTEGRAL EQUATION WITH THE GENERALIZED NEUMANN KERNEL FOR COMPUTING GREEN S FUNCTION FOR MULTIPLY CONNECTED REGIONS

UNIVERSITI PUTRA MALAYSIA. SYNTHESIS AND PHOTOCATALYTIC ACTIVITY OF BiVO4, Ag-BiVO4 AND Cu-BiVO4 IN DEGRADATION OF METHYLENE BLUE

EFFECT OF GRAPHENE OXIDE (GO) IN IMPROVING THE PERFORMANCE OF HIGH VOLTAGE INSULATOR NUR FARAH AIN BINTI ISA UNIVERSITI TEKNOLOGI MALAYSIA

MATHEMATICAL MODELING FOR TSUNAMI WAVES USING LATTICE BOLTZMANN METHOD SARA ZERGANI. UNIVERSITI TEKNOLOGI MALAYSIAi

OPTIMAL CONTROL BASED ON NONLINEAR CONJUGATE GRADIENT METHOD IN CARDIAC ELECTROPHYSIOLOGY NG KIN WEI UNIVERSITI TEKNOLOGI MALAYSIA

EVALUATION OF FUSION SCORE FOR FACE VERIFICATION SYSTEM REZA ARFA

WIND TUNNEL TEST TO INVESTIGATE TRANSITION TO TURBULENCE ON WIND TURBINE AIRFOIL MAHDI HOZHABRI NAMIN UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA STABILITY OF MARANGONI CONVECTION IN A FLUID LAYER WITH TEMPERATURE-DEPENDENT VISCOSITY NURUL HAFIZAH BINTI ZAINAL ABIDIN

UNIVERSITI PUTRA MALAYSIA DESIGN OF ROBUST PARTICLE SWARM OPTIMIZATION - TUNED FUZZY CONTROLLER FOR A SINGLE AXIS SMALL MAGNETIC LEVITATION SYSTEM

MORPHOLOGICAL, GENETIC AND BIOLOGICAL STUDIES OF RED PALM WEEVIL, Rhynchophorus spp. (COLEOPTERA: CURCULIONIDAE) IN TERENGGANU, MALAYSIA

RAINFALL SERIES LIM TOU HIN

UNIVERSITI PUTRA MALAYSIA

DEVELOPMENT AND CHARACTERIZATION OF MULTI-WAVELENGTH FIBER LASER LIGHT SOURCES BASED ON ERBIUM AND BRILLOUIN GAIN. By SUHAIRI SAHARUDIN

EFFECT OF ROCK MASS PROPERTIES ON SKIN FRICTION OF ROCK SOCKET. YUSLIZA BINTI ALIAS UNIVERSITI TEKNOLOGI MALAYSIA

AMPLIFICATION OF PARTIAL RICE FLORIGEN FROM MALAYSIAN UPLAND RICE CULTIVAR HITAM AND WAI ABDULRAHMAN MAHMOUD DOGARA UNIVERSITI TEKNOLOGI MALAYSIA

A COMPUTATIONAL FLUID DYNAMIC FRAMEWORK FOR MODELING AND SIMULATION OF PROTON EXCHANGE MEMBRANE FUEL CELL HAMID KAZEMI ESFEH

UNIVERSITI PUTRA MALAYSIA CLASSIFICATION OF LOW DIMENSIONAL NILPOTENT LEIBNIZ ALGEBRAS USING CENTRAL EXTENSIONS SEYED JALAL LANGARI IPM

UNIVERSITI PUTRA MALAYSIA FLOW CHARACTERISTICS AND SEDIMENT TRANSPORT IN A CHANNEL WITH EMERGENT FLEXIBLE VEGETATION

UNIVERSITI PUTRA MALAYSIA STABILIZATION OF PEAT SOIL USING ELECTROCHEMICAL INJECTION TECHNIQUE HOSSEIN MOAYEDI

UNIVERSITI PUTRA MALAYSIA DETECTION OF HEAVY METAL IONS IN SOLUTION USING SURFACE PLASMON RESONANCE OPTICAL SENSOR

UNSTEADY MAGNETOHYDRODYNAMICS FLOW OF A MICROPOLAR FLUID WITH HEAT AND MASS TRANSFER AURANGZAIB MANGI UNIVERSITI TEKNOLOGI MALAYSIA

SYNTHESIS AND CHARACTERIZATION OF MESO-SUBSTITUTED PORPHYRIN MUHAMMAD TAHIR MUHAMMAD

HIGH RESOLUTION DIGITAL ELEVATION MODEL GENERATION BY SEMI GLOBAL MATCHING APPROACH SITI MUNIRAH BINTI SHAFFIE

ROCK SHAFT RESISTANCE OF BORED PILES SOCKETED INTO DECOMPOSED MALAYSIA GRANITE RAJA SHAHROM NIZAM SHAH BIN RAJA SHOIB UNIVERSITI TEKNOLOGI MALAYSIA

DENSITY FUNCTIONAL THEORY SIMULATION OF MAGNETISM DUE TO ATOMIC VACANCIES IN GRAPHENE USING SIESTA

UNIVERSITI PUTRA MALAYSIA COPYRIGHT UPM PREPARATION AND CHARACTERIZATION OF HIGH- DENSITY POLYETHYLENE/POLYSTYRENE/CLAY NANOCOMPOSITES SUSSAN AZIZY

NUMERICAL INVESTIGATION OF TURBULENT NANOFLUID FLOW EFFECT ON ENHANCING HEAT TRANSFER IN STRAIGHT CHANNELS DHAFIR GIYATH JEHAD

ADSORPTION OF ACID FUCHSIN AND FAST GREEN ON ACTIVATED CARBONS

SHAPE-BASED TWO DIMENSIONAL DESCRIPTOR FOR SEARCHING MOLECULAR DATABASE

UNIVERSITI PUTRA MALAYSIA ANALYTICAL APPROACH FOR LINEAR PROGRAMMING USING BARRIER AND PENALTY FUNCTION METHODS PARWADI MOENGIN FSAS

ULTIMATE STRENGTH ANALYSIS OF SHIPS PLATE DUE TO CORROSION ZULFAQIH BIN LAZIM

MODELING AND CONTROL OF A CLASS OF AERIAL ROBOTIC SYSTEMS TAN ENG TECK UNIVERSITI TEKNOLOGY MALAYSIA

SYNTHESIS AND CHARACTERIZATION OF SUPRAMOLECULAR POLYMER BASED ON LINOLEIC ACID OF SUNFLOWER OIL MILI PURBAYA UNIVERSITI TEKNOLOGI MALAYSIA

COMMUTATIVITY DEGREES AND RELATED INVARIANTS OF SOME FINITE NILPOTENT GROUPS FADILA NORMAHIA BINTI ABD MANAF UNIVERSITI TEKNOLOGI MALAYSIA

A STUDY ON THE CHARACTERISTICS OF RAINFALL DATA AND ITS PARAMETER ESTIMATES JAYANTI A/P ARUMUGAM UNIVERSITI TEKNOLOGI MALAYSIA

ADSORPTION AND STRIPPING OF ETHANOL FROM AQUEOUS SOLUTION USING SEPABEADS207 ADSORBENT

EMPIRICAL STRENQTH ENVELOPE FOR SHALE NUR 'AIN BINTI MAT YUSOF

OPTIMIZATION OF CHROMIUM, NICKEL AND VANADIUM ANALYSIS IN CRUDE OIL USING GRAPHITE FURNACE ATOMIC ABSORPTION SPECTROSCOPY NURUL HANIS KAMARUDIN

INTEGRATED MALAYSIAN METEOROLOGICAL DATA ATMOSPHERIC DISPERSION SOFTWARE FOR AIR POLLUTANT DISPERSION SIMULATION

THE EFFECT OF THIN-LAYER ELEMENTS IN STRUCTURAL MODELING OF RAIL-TRACK SUPPORTING SYSTEM

INFLUENCES OF GROUNDWATER, RAINFALL, AND TIDES ON BEACH PROFILES CHANGES AT DESARU BEACH FARIZUL NIZAM BIN ABDULLAH

UNIVERSITI PUTRA MALAYSIA

SOLUBILITY MODEL OF PALM OIL EXTRACTION FROM PALM FRUIT USING SUB-CRITICAL R134a NUR SYUHADA BINTI ABD RAHMAN

MICROWAVE SYNTHESIS OF SODALITE FROM COAL FLY ASH AS SOLID BASE CATALYST FOR KNOEVENAGEL REACTION MOHD HILMI BIN MOHAMED

GENERATING MULTI-LEVEL OF DETAILS FOR THREE-DIMENSIONAL BUILDING MODELUSINGTERRESTRIAL LASER SCANNINGDATA RIZKA AKMALIA

ENGINEERING PROPERTIES OF OLDER ALLUVIUM BADEE ABDULQAWI HAMOOD ALSHAMERI. Universiti Teknologi Malaysia

UNIVERSITI PUTRA MALAYSIA NECESSARY AND SUFFICIENT CONDITION FOR EXTENTION OF CONVOLUTION SEMIGROUP MAI ZURWATUL AHLAM BINTI MOHD JAFFAR FS

ELECTRODEPOSITION OF CARBOXYLATED MULTIWALL CARBON NANOTUBE ON GRAPHITE REINFORCEMENT CARBON FOR VOLTAMMETRY DETECTION OF CADMIUM

EME 411 Numerical Methods For Engineers [Kaedah Berangka Untuk Jurutera]

UNIVERSITI PUTRA MALAYSIA

HYDROGEN RECOVERY FROM THE REFORMING GAS USING COMMERCIAL ACTIVATED CARBON MEHDI RAHMANIAN

AHMED MOKHTAR ALBSHIR BUDIEA

REMOVAL OF LEAD (II) BY NITRIC ACID-MODIFIED ACTIVATED CARBON

ISOLATION AND CHARACTERIZATION OF NANOCELLULOSE FROM EMPTY FRUIT BUNCH FIBER FOR NANOCOMPOSITE APPLICATION

DESIGN AND DEVELOPMENT OF A NOVEL MULTIWAVELENGTH BRILLOUIN-ERBIUM FIBER LASER

NUMERICAL SIMULATIONS ON THE EFFECTS OF USING VENTILATION FAN ON CONDITIONS OF AIR INSIDE A CAR PASSENGER COMPARTMENT INTAN SABARIAH BINTI SABRI

ONLINE LOCATION DETERMINATION OF SWITCHED CAPACITOR BANK IN DISTRIBUTION SYSTEM AHMED JAMAL NOORI AL-ANI

PENGGUNAAN GAMBAR RAJAH DALAM MENYELESAIKAN MASALAH GERAKAN LINEAR SITI NOR HIDAYAH BINTI ISMAIL UNIVERSITI TEKNOLOGI MALAYSIA

MAT 202 Introduction to Analysis [ Pengantar Analisis]

OPTICAL TWEEZER INDUCED BY MICRORING RESONATOR MUHAMMAD SAFWAN BIN ABD AZIZ

ERODABLE DAM BREACHING PATTERNS DUE TO OVERTOPPING NOR AIN BINTI MAT LAZIN UNIVERSITI TEKNOLOGI MALAYSIA

SPECTROSCOPIC PROPERTIES OF Nd:YAG LASER PUMPED BY FLASHLAMP AT VARIOUS TEMPERATURES AND INPUT ENERGIES SEYED EBRAHIM POURMAND

UNIVERSITI PUTRA MALAYSIA COPYRIGHT UPM

PRODUCTION OF POLYHYDROXYALKANATE (PHA) FROM WASTE COOKING OIL USING PSEUDOMONAS OLEOVORANS FARZANEH SABBAGH MOJAVERYAZDI

ALTERNATIVE STRIP METHOD FOR A LATERALLY DRIFTING SHIP IN WAVES MUHAMAD BIN RAMLI

t,' ij HAK r.jiilik QD478.N82015 desdestabilizing agent for solid state hydrogen storage / Nurul Shafikah Mohd Mustafa.

UNIVERSITI SAINS MALAYSIA. CCS513 Computer Vision and Image Analysis [Penglihatan Komputer dan Analisis Imej]

ELIMINATION OF RAINDROPS EFFECTS IN INFRARED SENSITIVE CAMERA AHMAD SHARMI BIN ABDULLAH

UNIVERSITI PUTRA MALAYSIA

DYNAMIC SIMULATION OF COLUMNS CONSIDERING GEOMETRIC NONLINEARITY MOSTAFA MIRSHEKARI

ADSORPTION OF ARSENATE BY HEXADECYLPYRIDINIUM BROMIDE MODIFIED NATURAL ZEOLITE MOHD AMMARUL AFFIQ BIN MD BUANG UNIVERSITI TEKNOLOGI MALAYSIA

SEDIMENTATION RATE AT SETIU LAGOON USING NATURAL. RADIOTRACER 210 Pb TECHNIQUE

SOLAR RADIATION EQUATION OF TIME PUNITHA A/P MARIMUTHOO

AUTOMATED MEASUREMENT OF LEVITATION FORCE USING LABVIEW PROGRAMMING LANGUAGE

CHARACTERISTICS OF SOLITARY WAVE IN FIBER BRAGG GRATING MARDIANA SHAHADATUL AINI BINTI ZAINUDIN UNIVERSITI TEKNOLOGI MALAYSIA

SPRAY DRIED PRODIGIOSIN FROM Serratia marcescens AS A FOOD COLORANT SHAHLA NAMAZKAR UNIVERSITI TEKNOLOGI MALAYSIA

Transcription:

UNIVERSITI PUTRA MALAYSIA ON THE IMPROVEMENT OF ADDITION CHAIN IN APPLICATIONS TO ELLIPTIC CURVE CRYPTOSYSTEM MOHAMAD AFENDEE MOHAMED IPM 2011 9

ON THE IMPROVEMENT OF ADDITION CHAIN IN APPLICATIONS TO ELLIPTIC CURVE CRYPTOSYSTEM By MOHAMAD AFENDEE MOHAMED Thesis Submitted to the School of Graduate Studies, Universiti Putra Malaysia in Fulfilment of the Requirements for the Degree of Doctor of Philosophy November 2011

DEDICATION MA DRE and PA DRE FA MI L I A MU J E R N I C K O and N I C K Y My Whom without there ll be no I Whom for I have my blood flowing Whom with I spend my ups and downs Whom with I grew my childhood ii

Abstract of thesis presented to the Senate of Universiti Putra Malaysia in fulfillment of the requirement for the degree of Philosophy of Doctor ON THE IMPROVEMENT OF ADDITION CHAIN IN APPLICATIONS TO ELLIPTIC CURVE CRYPTOSYSTEM By MOHAMAD AFENDEE MOHAMED November 2011 Chair: Mohamad Rushdan Md Said, PhD Faculty: Institute for Mathematical Research A hard problem most of the time can be broken into a sequence of simple tasks from which a solution to the original problem is obtainable. Originally, elliptic curve cryptography is based on a non-singular algebraic curve of genus 1. The process of encrypting message involves modular operation of huge integer n acting on points on elliptic curve. This operation namely scalar multiplication is formularized as Q = np. By restricting to only addition and doubling operations of two previous terms, it can be transformed into an equivalent iteration of Q = (2...(2(2(P)+b r 1 P)+b r 2 P)+...)+b 0 P). The resulting ascending sequence is called an addition chain. Finding an optimal chain was proven to be an NP-complete problem. Notwithstanding, this gives way to the emergence of many heuristics methods offering near optimal solution. All in all, the study of efficient point arithmetic on elliptic curves can be reduced to the study of optimizing an addition chain. iii

This thesis centers around an investigation into a new method to improve scalar multiplication operation. Ultimately, the objective is to minimize the execution time of EC point arithmetic. One of the ways to achieve this is through shorter addition chain. The proposed method will be developed from scratch, and are subjected to some theoretical analysis. For the purpose of empirical test, some parameters are defined in the course to validating the findings. Existing methods exploit the binary(m-ary) representation of an integer n, whilst the new method to be proposed opens up a new window of research into the problem. An integer n is decomposed into its prime factor p e 1 1 p e 2 2...p es A classical one-layered approach is transformed into a two-layered approach. Efficiency can be improved at prime p i layer, prime power p e i i layer and the combination of prime power layer that make up an n. Initially, a Decomposition Method (DM) is developed based on prime power factorization of an integer n. Each factor p i is assigned a unique rule from which an addition chain will be generated. An e i multiple of each rule p i generates an addition chain for p e i i of which be further combined altogether to build up n. Mathematical analysis shows that the chain generated by this method is confined to the similar boundary as that of an optimal chain studied by A. Brauer. Experiment shows a significant advantage over existing methods under appropriate working conditions. An improved version, Signed Decomposition Method (SDM) introduces a subtraction operation into the sequence to generate an addition subtraction chain. P. Erdos stated that addition subtraction s. chain is always at most as lengthy as an addition chain. It follows that SDM iv

outperforms its predecessor by 8 percents. Moreover, the generated chains are shown to outclass existing methods with significant improvement. Additionally, we developed a Composition Method (CM) which bears the idea of computing addition chain directly from the respective rule for n. Unlike decomposition based methods, CM brings back the approach to one-layered with most of its properties are inherited from DM at prime layer. An improved version called Signed Composition Method (SCM) is also proposed as an implication of introducing a subtraction operation into CM. The generated chain by SCM has recorded an improvement of 10 percent over its predecessor. Furthermore, SCM has shown an advantage over existing methods for selected integers. Earlier comparison between DM and CM favours DM for most n. However, experimental result for SDM against SCM shows that for small integers SDM is in favour over SCM, but as n grows, SCM gradually start to outperform SDM. v

Abstrak tesis yang dikemukakan kepada Senat Universiti Putra Malaysia sebagai memenuhi keperluan untuk ijazah Doktor Falsafah TENTANG PENAMBAHBAIKAN RANTAIAN PENAMBAHAN DALAM APLIKASI KRIPTOGRAFI KELUK ELIPTIK Oleh MOHAMAD AFENDEE MOHAMED November 2011 Pengerusi: Mohamad Rushdan Md Said, PhD Fakulti: Institut Penyelidikan Matematik Kebiasaanya, sesuatu permasalahan yang genting dapat dijelma menjadi satu siri permasalahan yang sederhana kesukarannya di mana penyelesaian kepada masalah asal mudah didapati. Pada awalnya, kriptografi keluk eliptik didasarkan pada keluk aljabar tak-tunggal dengan kerabat 1. Proses pengkriptanan mesej melibatkan operasi nombor bulat besar modulo n yang bertindak ke atas titik-titik di atas keluk eliptik. Operasi yang dinamakan hasil darab skala ini boleh dirumuskan sebagai Q = np. Dengan membataskan operasi hanya kepada hasil tambah dan ganda-dua oleh dua sebutan terdahulu, ianya boleh ditransformasikan menjadi iterasi setara Q = (2...(2(2(P) + b r 1 P) + b r 2 P)+...)+b 0 P). Turutan menaik yang dihasilkan dikenali sebagai rantaian tambahan. Menemukan sesuatu rantai optimum telah terbukti menjadi permasalahan NP-lengkap. Perihal ini memberi ruang kepada kemunculan kaedahkaedah heuristik yang menyediakan penyelesaian hampir optimum. Dengan vi

ini, kajian tentang aritmetik titik yang cekap pada keluk eliptik boleh dipermudahkan menjadi kajian cara pengoptimuman rantaian tambahan. Tesis ini berkisar tentang penyelidikan suatu kaedah baru untuk mempercekapkan hasil darab skala. Ianya bertujuan untuk meningkatkan kelajuan pelaksanaan aritmetik titik EC. Hal ini boleh dicapai melalui pemendekan rantaian tambahan. Kaedah baru ini akan dibangunkan dari awal, dan dianalisis secara matematik. Untuk tujuan ujian makmal, beberapa pembolehubah akan digunakan untuk mengesahkan penemuan-penemuan ini. Kaedah-kaedah sedia ada mengeksploitasi perwakilan dedua(de-m) untuk sesuatu nombor bulat n, sementara kaedah baru yang akan dicadangkan pula membuka lembaran baru untuk mengkaji permasalahan ini. Nombor bulat n dileraikan kepada hasil darab unsur perdana berbentuk p e 1 1 p e 2 2...p es s. Pendekatan klasik satu-lapisan digubah menjadi pendekatan dua-lapisan. Kecekapan boleh dipertingkatkan di lapisan perdana p i, lapisan kuasa perdana p e i i dan juga lapisan penggabungan sesama kuasa perdana dalam membentuk sesuatu n. Pada awalnya, Kaedah Terurai (DM) telah dibangunkan berasaskan kepada peleraian kuasa perdana dari sesuatu nombor bulat n. Setiap perdana p i, diberikan satu peraturan yang unik bagi menghasilkan rantaian tambahan. Suatu e i penggandaan setiap peraturan p i menghasilkan rantaian tambahan untuk p e i i yang jika digabungkan sesama sendiri akan menghasilkan n. Analisis bermatematik menunjukkan bahawa rantaian yang dihasilkan oleh kaedah ini terbatas pada lingkungan rantai optimum yang dikaji oleh A. Brauer. Ujian menunjukkan penambahbaikan yang besar telah terhasil melalui kaedah ini vii

berbanding dengan kaedah-kaedah yang terdahulu. Suatu versi yang lebih baik dinamakan Kaedah Terurai Bertanda (SDM), memperkenalkan operasi pengurangan ke dalam turutan bagi menghasilkan rantaian tambahan kurangan. P. Erdos menyatakan bahawa paling panjang rantaian tambahan kurangan adalah sepanjang rantaian tambahan. Hasilnya, SDM berjaya menambahbaik DM sebanyak 8 peratus. Lebih lagi, ia berjaya mengatasi kebolehan kaedah-kaedah yang sebelumnya dengan penambahbaikan yang besar dan sejajar. Sebagai tambahan, kami telah bangunkan Kaedah Komposisi (CM) yang berasaskan pengiraan rantaian tambahan secara langsung dari peraturan bagi n. Berbeza dari kaedah penguraian, CM kembali kepada pendekatan satu lapisan dengan kebanyakan sifatnya diwarisi dari DM pada lapisan perdana. Suatu versi penambahbaikan yang dinamakan Kaedah Komposisi Bertanda (SCM) juga dicadangkan sebagai implikasi memperkenalkan operasi pengurangan ke dalam CM. Rantaian yang dihasilkan oleh SCM telah mencatatkan peningkatan sebanyak 10 peratus berbanding dengan CM. Tambahan pula, SCM telah menunjukkan kelebihan berbanding kaedah sedia ada bagi kebanyakan n. Perbandingan awal antara DM dan CM memihak ke arah DM untuk semua n. Walau bagaimanapun, uji kaji antara SDM dan SCM menunjukkan bahawa untuk n yang kecil, SDM adalah lebih baik dari SCM, tetapi untuk n yang besar, SCM sebaliknya mengatasi SDM. viii

ACKNOWLEDGEMENTS This thesis describes the months of research works I conducted during my PhD candidature at INSPEM, Universiti Putra Malaysia. The studies centered on elliptic curve cryptography. This thesis shows the result of contribution of many people whom expressed their ideas, experiences, knowledge and competence and like. For this reason, here is my short but sole and sincere appreciation. First and foremost, all praise to the Almighty Allah for His blessings and mercifuls that enable me to learn. I am priviledged to have known Dr. Rushdan who had offered progressive support, ingeneous critics and brilliant suggestions throughout the tenure. I am deeply indebted to Prof. Kamel for his invaluable insights and thorough inductiveness on theoretical foundation of my studies. I am grateful to Dr. Zuriati for her encouragement and continous support from the first day of my PhD. My sincere appreciation to Prof. Kamel for his lectures on number theory and algebraic number theory and for being with so much patient with my overtimely manner questions, Dr Isamiddin for his lectures on abstract algebra and for being able to answer if not all, most of my non-stopped questions, and Dr. Ali for his lectures on computational algorithm, of which altogether, they have had (almost) completed the foundation I need to conduct this research. My special thanks to INSPEM secretaries for the documentation and administrative issues, anonymous reviewers for which have contributed to the improvement of the quality of my articles, thesis examiners for their reviews, constructive feedbacks and corrections which have put up my thesis for the better. Last but never least, my everything, my mother for her unlimited love, my wife and my family for whom I am inspired to do this study. ix

I certify that a Thesis Examination Committee has met on 15 November 2011 to conduct the final examination of Mohamad Afendee Mohamed on his thesis entitled On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem in accordance with the Universities and University Colleges Act 1971 and the Constitution of the Universiti Putra Malaysia [P.U.(A) 106] 15 March 1998. The Committee recommends that the student be awarded the Doctor of Philosophy. Members of the Thesis Examination Committee were as follows: Hishamuddin Zainuddin, PhD Associate Professor Faculty of Science Universiti Putra Malaysia (Chairman) Azmi Jaafar, PhD Associate Professor Faculty of Computer Science and Information Technology Universiti Putra Malaysia (Internal Examiner) Siti Hasana Sapar, PhD Senior Lecturer Faculty of Science Universiti Putra Malaysia (Internal Examiner) Raphael Phan, PhD Lecturer Loughborough University England (External Examiner) SEOW HENG FONG, PhD Professor and Deputy Dean School of Graduate Studies Universiti Putra Malaysia Date: 20 December 2011 x

This thesis was submitted to the Senate of Universiti Putra Malaysia and has been accepted as fulfilment of the requirement for the degree of Doctor of Philosophy. The members of Supervisory Committee were as follows: Mohamad Rushdan Md Said, PhD Associate Professor Faculty of Science Universiti Putra Malaysia (Chairman) Kamel Ariffin Mohd Atan, PhD Professor Faculty of Science Universiti Putra Malaysia (Member) Zuriati Ahmad Zukarnain, PhD Associate Professor Faculty of Computer Science and Information Technology Universiti Putra Malaysia (Member) BUJANG KIM HUAT, PhD Professor and Dean School of Graduate Studies Universiti Putra Malaysia Date: xi

DECLARATION I declare that the thesis is my original work except for quotations and citations which have been duly acknowledged. I also declare that it has not been previously, and is not concurrently, submitted for any other degree at Universiti Putra Malaysia or at any other institution. MOHAMAD AFENDEE MOHAMED Date: 15 November 2011 xii

TABLE OF CONTENTS Page DEDICATIONS ABSTRACT ABSTRAK ACKNOWLEDGMENTS APPROVAL DECLARATION LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF NOTATIONS CHAPTER ii iii vi ix x xii xvi xvii xviii xix 1 INTRODUCTION 1 1.1 Cryptology 1 1.1.1. Foundation of Cryptography 2 1.1.2. Keyed Cryptography 4 1.1.3. Public Key Cryptography 5 1.2 Problem Statement 9 1.3 Objectives 11 1.4 Contribution 11 1.5 Thesis Organisation 13 2 ELLIPTIC CURVE 16 2.1 Introduction 16 2.2 Mathematical Background 17 2.3 Group Structure 24 2.4 Elliptic Curve Over Finite Fields 31 2.5 Endomorphism 36 2.6 Summary 39 3 SCALAR MULTIPLICATION 40 3.1 Introduction 40 3.2 Addition Chain 41 3.3 Integer representation 47 3.3.1. Binary representation 48 3.3.2. m-ary representation 60 3.3.3. ψ-ary representation 64 3.4 Addition Chain Methods 68 3.4.1. Binary Method 68 xiii

3.4.2. m-ary Method 71 3.4.3. ψ-ary Method 73 3.5 Window Size Against Key Size 74 3.5.1. Algorithm Development 74 3.5.2. Results 76 3.6 Summary 79 4 DECOMPOSITION METHOD 80 4.1 Introduction 80 4.2 Decomposition Method 81 4.3 Algorithm Development 90 4.3.1. Building Up Rules 92 4.3.2. Constructing Chain 95 4.4 Analysis 96 4.5 Result 101 4.6 Summary 103 5 SIGNED DECOMPOSITION METHOD 105 5.1 Introduction 105 5.2 Decomposition Method Revisited 107 5.3 Signed Decomposition Method 109 5.4 Algorithm Development 119 5.5 Analysis 120 5.6 Results 126 5.7 Summary 129 6 COMPOSITION BASED METHODS AND COMPARA- TIVE STUDIES 130 6.1 Introduction 130 6.2 Composition Method 131 6.3 Signed Composition Method 133 6.4 Algorithm Development 135 6.5 Analysis 137 6.6 Results 139 6.6.1. DM versus CM 141 6.6.2. SCM versus CM 145 6.6.3. SDM versus DM 149 6.6.4. SDM versus SCM 153 6.7 Summary 157 7 CONCLUSION 158 7.1 Work Done 158 7.2 Open Questions 160 xiv

BIBLIOGRAPHY 162 BIODATA OF STUDENT 172 LIST OF PUBLICATIONS 173 xv