Cryptographic Algorithm based on Elliptic Curves for Key Generation, Encryption and Decryption398

Published: Jun 28, 2024
Keywords:
Cryptography, elliptic curves, encryption, decryption, key generation

Main Article Content

Guadalupe Hernández Salmerón
Fidel González Gutiérrez
Pedro Chávez Barrios

Abstract

The primary objective of this manuscript is to introduce a cryptographic algorithm based on elliptic curves, aiming to enhance efficiency in key storage and runtime for security applications. The research methodology is built upon a series of specific functions, ranging from key generation to the processes of data encoding and decoding, employing mathematical operations on elliptic curves. The noteworthy results primarily highlight the demonstrated efficiency in terms of key storage space utilization and runtime, significantly contributing to the optimization of resources in information security systems. While recognizing certain limitations and considerations in parameter and key selection, the uniqueness and value of this research lie in its capacity to improve efficiency in safeguarding sensitive data. This study concludes that elliptic curve cryptography provides an effective solution to address challenges in key storage and performance, resulting in a substantial enhancement of information security system efficiency.

Downloads

Download data is not yet available.

Article Details

How to Cite
Hernández Salmerón, G., González Gutiérrez, F., & Chávez Barrios, P. (2024). Cryptographic Algorithm based on Elliptic Curves for Key Generation, Encryption and Decryption. Revista Del Centro De Investigación De La Universidad La Salle, 16(62), 161–180. https://doi.org/10.26457/recein.v16i62.3994
Section
Artículos

References

Abhishek, K., & Prakash Raj, E. G. D. (2021). Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography. 21(2), 71–88.

Alhayani, B. S. A., Hamid, N., Almukhtar, F. H., Alkawak, O. A., Mahajan, H. B., Kwekha-Rashid, A. S., İlhan, H., Marhoon, H. A., Mohammed, H. J., Chaloob, I. Z., & Alkhayyat, A. (2022). Optimized video internet of things using elliptic curve cryptography-based encryption and decryption. Computers and Electrical Engineering, 101. https://doi.org/10.1016/j.compeleceng.2022.108022

Alimoradi, R., Arkian, H. R., Razavian, S. M. J., & Ramzi, A. (2021). Scalar multiplication in elliptic curve libraries. Journal of Discrete Mathematical Sciences and Cryptography, 24(3). https://doi.org/10.1080/09720529.2017.1378411

Arya, E. S., & Kumar, A. (2017). Ascii Based Encryption Decryption Technique for Information Security and Communication. 3rd International Conference on Innovative Trends in Science, Engineering and Management, YMCA Connaught Place, New Delhi, 7th January.

Barbosa Camilo, Castang Gerardo, & Tibaquira Yesid. (2011). Implementación del criptosistema de curva elíptica en entornos móviles. VINCULOS, 8. https://doi.org/10.14483/2322939X.4198

Biddle, G., McGoldrick, L., & Halamek, J. (2021). Non-traditional encryption methods: Moving toward electrochemical cryptography. Electrochemical Science Advances, 1–7. https://doi.org/10.1002/elsa.202100188

Chávez, M. A. L., & Henríquez, F. R. (2021). Post-Quantum Digital Signature for the Mexican Digital Invoices by Internet. Computacion y Sistemas, 25(4). https://doi.org/10.13053/CyS-25-4-4048

Colliard Schneider, C. D., & Maris Vaira, S. (2019). Protocolos Criptográficos Basados en los Algoritmos de Diffie-Hellman y RSA.

Fúster, A., Guía, D. de la, & Hernandez, L. (2001). Técnicas criptográficas de protección de datos. México.

Johnson, D., Menezes, A., & Vanstone, S. (2021). The Elliptic Curve Digital Signature Algorithm (ECDSA).

Josias Gbètoho Saho, N., Ezin, E. C., Josias Saho, N. G., Ezin, -Eugène C, Watson, B., Badouel, Er., & Niang, O. (2020). Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm. https://hal.science/hal-02926106

Li, J., & Gao, W. (2022). Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA. Journal of Sensors, 2022. https://doi.org/10.1155/2022/9074524

Li, W., Chang, X., Yan, A., & Zhang, H. (2021). Asymmetric multiple image elliptic curve cryptography. Optics and Lasers in Engineering, 136. https://doi.org/10.1016/j.optlaseng.2020.106319

Madariaga, A. P. (n.d.). Curvas Elípticas y Criptografía.

Trappe, W., & Washington, L. C. (2006). Introduction to Cryptography with Coding Theory (2nd ed.). Pearson Education. Inc., Ed.

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.