IMPLEMENTATION OF A CRYPTOGRAPHICALLY STRONG ALGORITHM WITH A SIMPLE ENCRYPTION AND DECRYPTION PROCEDURE BASED ON ELLIPTIC CURVES

Authors

DOI:

https://doi.org/10.32782/tnv-tech.2023.3.2

Keywords:

elliptic curves, digital signature, encryption, decryption, algorithm, cubic plane curve.

Abstract

The work considers various methods and advantages of using cryptographic algorithms based on the theory of elliptic curves. Examples of implementation of electronic digital signature schemes based on these algorithms are also given. One of the key advantages of algorithms based on elliptic curves is to provide a high level of security with smaller key sizes compared to other cryptographic systems. The work examines in detail which elliptic curves can be used in various cryptographic schemes. A comparison with other algorithms such as RSA or DSA is also given, noting the advantages of using elliptic curves. The paper gives examples of implementation of electronic digital signature schemes using elliptic curves. Digital signatures are an important mechanism for authentication and data integrity in cryptography, and the use of elliptic curves can improve the effectiveness and security of such signatures. During testing, a linear dependence of time on the number of algorithm runs was revealed. The execution time of the RSA algorithm is approximately equal to the execution time of the DSA algorithm. This is primarily due to the linear launch of the algorithms. When it comes to schemes based on elliptic curves, they allow you to achieve the desired level of security with a much smaller key length than in the case of the RSA scheme. When using elliptic curves, it is possible to provide the same level of information protection by using smaller keys compared to traditional methods such as RSA. The work helps to understand the use of the theory of elliptic curves in cryptography, providing information on various methods and applications of these algorithms, in particular, in electronic digital signature schemes.

References

Timothy P. Layton. Information Security. Auerbach Publications. 2016. Р. 264. ISBN 9781420013412

John R. Vacca. Computer and Information Security handbook. Morgan Kaufmann. 2017. eBook ISBN 9780128039298

Ali Evren Göksungur. Electronic Signature and Electronic Document Management Systems. Scholars' Press. 2018. Р. 56. ISBN 9783330652200

Elaine Barker, Lily Chen, Allen Roginsky, Miles Smid. Recommendation for Pair- Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. National Institute of Standards and Technology, 2013. ISBN 1495447502.

Avani Shah, Vinayak Bharadi. Online Signature Recognition Using Sectorization of Complex Plane. LAP LAMBERT Academic Publishing. 2014. Р. 104. ISBN 9783659594199

Nivethaa Shree, Latha Parthiban. Elliptic Curve Cryptography for Digital Signature Authentication. LAP LAMBERT Academic Publishing. 2013. Р. 60. ISBN 9783659263958

Martin Krisell. Elliptic Curve Digital Signatures in RSA Hardware. Scholars' Press. 2013. Р. 108. ISBN 9783639511826 8. Fabrizio Romano, Heinrich Kruger. Learn Python Programming. Packt Publishing. 2023. Р. 552. ISBN 9781801815529

Published

2023-10-09

How to Cite

Завгородній, В. В., Завгородня, Г. А., Березінський, Ю. С., & Березінська, І. П. (2023). IMPLEMENTATION OF A CRYPTOGRAPHICALLY STRONG ALGORITHM WITH A SIMPLE ENCRYPTION AND DECRYPTION PROCEDURE BASED ON ELLIPTIC CURVES. Таuridа Scientific Herald. Series: Technical Sciences, (3), 13-20. https://doi.org/10.32782/tnv-tech.2023.3.2

Issue

Section

COMPUTER SCIENCE AND INFORMATION TECHNOLOGY