SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES

Authors

  • G. Golovko
  • M. Kalynovych

DOI:

https://doi.org/10.26906/SUNZ.2023.1.084

Keywords:

Cryptography, Public-key cryptography, ECC, RSA, ASPNET, Cybersecurity, Encryption

Abstract

The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Internet connection, you can solve most of life's problems without leaving home – from ordering dinner to receiving government services. Nowadays, when educational institutions and businesses have been forced to switch to a remote form of work due to the pandemic, the issue of information protection is more pressing than ever. There are many cryptographic algorithms that have protected our information on the Internet for decades, but as computing power grows, so do the demands on such algorithms. Some of them have not coped with the challenge of time and are no longer used, which is why there is a need to develop new algorithms that use more complex mathematical principles and provide a higher level of security. And there is a whole class of algorithms that use the principles of elliptic curves to provide greater security with relatively lower use of system resources.

Downloads

References

В. О. Хорошко, М. В. Капустян (2010). Захист інформації. Інститут енциклопедичних досліджень НАН України. https://esu.com.ua/article-15872

Bellare, Mihir; Rogaway, Phillip (2005). Introduction to Modern Cryptography. University of California at Davis.

Maletsky K. (2020). RSA vs. ECC Comparison for Embedded Systems. https://ww1.microchip.com/downloads/en/DeviceDoc/00003442A.pdf

Arjen K. Lenstra, Thorsten Kleinjung, and Emmanuel Thome (2013). Universal security from bits and mips to pools, lakes – and beyond. Cryptology ePrint Archive, Paper 2013/635. https://eprint.iacr.org/2013/635

Joseph J. Rotman (1995). An Introduction to the Theory of Groups. Fourth Edition. Springer-Verlag New York, Inc.

Cherneva, G., & Khalimov, P. (2021). Mutation testing of access control policies. Advanced Information Systems, 5(1), 118–122. https://doi.org/10.20998/2522-9052.2021.1.17

Mozhaev, O., Kuchuk, H., Kuchuk, N., Mykhailo, M., Lohvynenko, M. (2017), “Multiservice network security metric”, 2nd International Conference on Advanced Information and Communication Technologies, AICT 2017 – Proceedings, pp. 133-136, DOI: https://doi.org/10.1109/AIACT.2017.8020083

Klimushin, P., Solianyk, T., Kolisnyk, T., & Mozhaiv, O. (2021). Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things. Advanced Information Systems, 5(3), 103–111. https://doi.org/10.20998/2522-9052.2021.3.14

Atkin, A. O. L. and Morain, F. (1993). Elliptic Curves and Primality Proving. American Mathematical Society.

Daniel R. L. Brown (2009). SEC 1: Elliptic Curve Cryptography. https://www.secg.org/sec1-v2.pdf

Daniel R. L. Brown (2010). SEC 2: Recommended Elliptic Curve Domain Parameters. https://www.secg.org/sec2-v2.pdf

Daniel R., Rick A., and Shaun L. (2022). Overview of ASP.NET Core. https://learn.microsoft.com/enus/aspnet/core/introduction-to-aspnet-core?view=aspnetcore-7.0

Downloads

Published

2023-03-17

Most read articles by the same author(s)

1 2 > >>