Rahma M. Models and methods for constructing operating units for Galois fields used in cryptographic data protection based on elliptic curves

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0419U005063

Applicant for

Specialization

  • 05.13.05 - Комп'ютерні системи та компоненти

29-11-2019

Specialized Academic Board

Д 35.052.08

Lviv Polytechnic National University

Essay

The dissertation is devoted to the solution of the scientifically applied problem of creation of operating units for Galois fields used in cryptographic data protection on the basis of elliptic curves. The main attention is paid to the development of methods for estimating the time, structural and capacitance complexity of multipliers of elements of extended Galois fields GF(dm), the method of assessing the complexity of hacking hardware cryptographic data protection tools and the method of masking their work, as well as improving the method of embedded testing of the operating units. Complexity estimation is based on the representation of the multiplier structure in the form of a matrix of modified Guild cells, with an initial analysis of their complexity for different fields and taking into account the results obtained when evaluating the multiplier complexity. The application of the method: an extended Galois field is selected; the basis for representing the elements of the Galois fields is selected; the basic elements of the multiplier are selected; the structure of the basic elements is selected; the structure of the multiplier is selected; the selected type of complexity is analyzed, relative values of complexity parameters are formed with respect to similar parameters of the extended binary field; studies are repeated for all selected to analyze extended Galois fields; the results of the study are recorded; the best field is determined. The application of the developed methods allowed us to determine the best Galois extended fields in comparison with the binary ones (among fields with approximately the same number of elements). They were fields with characteristics 3, 5 and 7. A significantly lower structural complexity of multipliers for the polynomial basis than the normal one was also established, which explains the difficulty of implementing the multipliers for the normal basis in the FPGA. A method of masking the operation of inverters is proposed and implemented. The method of built-in multiplier testing is improved. Code combinations that will never be encountered when processing elements of an extended Galois field during normal operation of processor nodes, memory nodes, and data channels exist. These unused (forbidden) code combinations can be used to monitor the performance of data protection tools while performing their essential functions (built-in controls can be implemented). But 100% of all, even single, errors can not be detected. The results obtained should be considered as an estimate of the proportion of errors that can be detected by the proposed method. A table-based method for describing the occurrence of erroneous codes is suggested. The method of masking the operation of hardware units for finding inverted elements in extended binary Galois fields in a polynomial basis is presented. The development of a method of masking operating nodes for Galois fields used in data protection based on elliptic curves consists in equalizing the computation time of inverted elements in a polynomial basis by refusing to use the Euclid generalized algorithm in favor of direct binary algorithms or exponential algorithms. The use of exponential algorithms requires the efficient operation of squaring or finding the square root. Masking through the use of the proposed methods leads to an increase in the time of finding the inverted element and (or) to an increase in hardware costs. The structure of the special processor for processing elements of extended Galois fields is proposed. The design tool was implemented in the form of a generator of multiplier and inverter models, with its help a number of multipliers and inverters were developed, checks of adequacy of the proposed methods and means were carried out, their implementation was carried out. The results of the dissertation work are implemented during the execution of design works on f. AL-NABAA Network Solution L.L.C. (Baghdad, Iraq), during the state budget research work of the DB/KIBER "Integration of methods and means of measuring, automation, processing and protection of information in the base of cyber-physical systems" and in the educational process in Lviv Polytechnic National University.

Files

Similar theses