Cryptographic Algorithm based on Elliptic Curves for Key Generation, Encryption and Decryption398
Article Sidebar
Main Article Content
Abstract
The primary objective of this manuscript is to introduce a cryptographic algorithm based on elliptic curves, aiming to enhance efficiency in key storage and runtime for security applications. The research methodology is built upon a series of specific functions, ranging from key generation to the processes of data encoding and decoding, employing mathematical operations on elliptic curves. The noteworthy results primarily highlight the demonstrated efficiency in terms of key storage space utilization and runtime, significantly contributing to the optimization of resources in information security systems. While recognizing certain limitations and considerations in parameter and key selection, the uniqueness and value of this research lie in its capacity to improve efficiency in safeguarding sensitive data. This study concludes that elliptic curve cryptography provides an effective solution to address challenges in key storage and performance, resulting in a substantial enhancement of information security system efficiency.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All articles published in the RECEIN Journal are under an open access policy and can be permanently free for everyone to read, download, copy and distribute according to the CC-BY license, except where otherwise noted.
References
Abhishek, K., & Prakash Raj, E. G. D. (2021). Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography. 21(2), 71–88.
Alhayani, B. S. A., Hamid, N., Almukhtar, F. H., Alkawak, O. A., Mahajan, H. B., Kwekha-Rashid, A. S., İlhan, H., Marhoon, H. A., Mohammed, H. J., Chaloob, I. Z., & Alkhayyat, A. (2022). Optimized video internet of things using elliptic curve cryptography-based encryption and decryption. Computers and Electrical Engineering, 101. https://doi.org/10.1016/j.compeleceng.2022.108022
Alimoradi, R., Arkian, H. R., Razavian, S. M. J., & Ramzi, A. (2021). Scalar multiplication in elliptic curve libraries. Journal of Discrete Mathematical Sciences and Cryptography, 24(3). https://doi.org/10.1080/09720529.2017.1378411
Arya, E. S., & Kumar, A. (2017). Ascii Based Encryption Decryption Technique for Information Security and Communication. 3rd International Conference on Innovative Trends in Science, Engineering and Management, YMCA Connaught Place, New Delhi, 7th January.
Barbosa Camilo, Castang Gerardo, & Tibaquira Yesid. (2011). Implementación del criptosistema de curva elíptica en entornos móviles. VINCULOS, 8. https://doi.org/10.14483/2322939X.4198
Biddle, G., McGoldrick, L., & Halamek, J. (2021). Non-traditional encryption methods: Moving toward electrochemical cryptography. Electrochemical Science Advances, 1–7. https://doi.org/10.1002/elsa.202100188
Chávez, M. A. L., & Henríquez, F. R. (2021). Post-Quantum Digital Signature for the Mexican Digital Invoices by Internet. Computacion y Sistemas, 25(4). https://doi.org/10.13053/CyS-25-4-4048
Colliard Schneider, C. D., & Maris Vaira, S. (2019). Protocolos Criptográficos Basados en los Algoritmos de Diffie-Hellman y RSA.
Fúster, A., Guía, D. de la, & Hernandez, L. (2001). Técnicas criptográficas de protección de datos. México.
Johnson, D., Menezes, A., & Vanstone, S. (2021). The Elliptic Curve Digital Signature Algorithm (ECDSA).
Josias Gbètoho Saho, N., Ezin, E. C., Josias Saho, N. G., Ezin, -Eugène C, Watson, B., Badouel, Er., & Niang, O. (2020). Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm. https://hal.science/hal-02926106
Li, J., & Gao, W. (2022). Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA. Journal of Sensors, 2022. https://doi.org/10.1155/2022/9074524
Li, W., Chang, X., Yan, A., & Zhang, H. (2021). Asymmetric multiple image elliptic curve cryptography. Optics and Lasers in Engineering, 136. https://doi.org/10.1016/j.optlaseng.2020.106319
Madariaga, A. P. (n.d.). Curvas Elípticas y Criptografía.
Trappe, W., & Washington, L. C. (2006). Introduction to Cryptography with Coding Theory (2nd ed.). Pearson Education. Inc., Ed.
English