ANALYSIS OF CRYPTOSYSTEMS BASED ON ELLIPTIC CURVES

Umarov Shohzod Zafar oʻgʻli

TUIT named after Muhammad al-Khorazmi, master student

Keywords: Elliptic curves, encryption algorithms, digital signature algorithms, key distribution algorithms


Abstract

Elliptic Curve Cryptography (EECH) is a public-key cryptographic technique that uses the mathematical properties of elliptic curves to secure data transmission over the Internet. EECH is known for providing robust security, providing sufficient tolerance for smaller key lengths compared to traditional cryptographic methods such as RSA or Diffie-Hellman. In general, EECH is relevant in scenarios where security is important and computing resources are limited. This article presents an analysis of various cryptographic algorithms based on EECH


References

Z. Liu, E. Wenger, and J. Großschädl, MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks, pp. 361–379. Cham: Springer International Publishing, 2014.

C. Lederer, R. Mader, M. Koschuch, J. Großschädl, A. Szekely, andS. Tillich, “Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks,” in Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP ’09, (Berlin, Heidelberg), pp. 112–127, Springer-Verlag, 2009.

Akbarov Davlatali Yegitaliyevich, Xasanov Po‘lat Fattoxovich, Xasanov Xislat Po‘latovich, Axmedova Oydin Po‘latovna, Xolimtayeva Iqbol Ubaydullayevna “Kriptografiyaning matematik asoslari”. O‘quv qo‘llanma. – Toshkent. TATU. 2018 – 208 bet.

Z. Liu, J. Weng, Z. Hu, and H. Seo, “Efficient Elliptic Curve Cryptography for Embedded Devices,” ACM Trans. Embed. Comput. Syst., vol. 16, pp. 53:1–53:18, Dec. 2016.

W. Diffie and M. Hellman “New directions in cryptography” Information Theory, IEEE Transactions on, vol. 22, pp. 644 – 654. 1976.