THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY

Ognjen Milivojević ,
Ognjen Milivojević
Contact Ognjen Milivojević

Fakultet Informacionih Tehnologija, Panevropski Univerzitet “Apeiron” , Banja Luka , Bosnia and Herzegovina

Boris Damjanović
Boris Damjanović

Fakultet Informacionih Tehnologija, Panevropski Univerzitet “Apeiron” , Banja Luka , Bosnia and Herzegovina

Received: 03.10.2023.

Accepted: 17.11.2023. >>

Published: 29.11.2023.

Volume 5, Issue 2 (2023)

pp. 84-90;

https://doi.org/10.7251/STED2302084M

Abstract

Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat's last theorem. They are also connected with many hypotheses and problems in mathematics that have yet to be solved. Elliptic curves defined over finite fields are widely used in public key cryptography, since they have proven to be groups that have the best properties for implementing the Diffie-Hellman protocol. This article provides an overview of the theoretical assumptions that are necessary for the development of cryptographic algorithms based on elliptic curve cryptography, which includes defining elliptic curves, defining the properties of arithmetic operations on elliptic curves used in cryptography with reference to curves defined over finite fields.

 

Keywords

References

Atticus, K. (2019). Elliptic Curves in Cryptography.
Barsagade, M. W., & Meshram, S. (2014). Overview of history of elliptic curves and its use in cryptography. *International Journal of Scientific & Engineering Research, 5*(4, 467–471.
Connell, I. (1999). Elliptic curve handbook.
Gallian, J. (2021). *Contemporary abstract algebra*.
Gordon, S. (2022). Cryptography Study Notes.
Halmos, P. R. (1960). *Naive set theory*.
Hoffstein, J. P. (2006). *An Introduction to Mathematical Cryptography*.
Husemoller, D. (1987). *Elliptic Curves*.
Knapp, A. W. (1992). *Elliptic curves* (Vol. 40).
Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. *Designs, Codes and Cryptography, 19, 173–193.
Marseglia, S. (2019). *Elliptic Curves over Finite Fields*.
Milivojević, O., & Damjanović, B. (2023). Teoretske pretpostavke za uvod u kriptografiju eliptičnih krivih. *STED Journal, 5*(2, 84–90.
Milne, S. (2006). *Elliptic curves*.
Muyinda, N. (2009). Elliptic curve cryptography.
Prynn, T. (2015). A Gentle Introduction to Elliptic Curve.
Walker, J. L. (2012). *Codes and Curves*.
Washington, C. L. (2008). *Elliptic curves: number theory and cryptography*.
Wiener, M. J., & Zuccherto, R. J. (1998). Faster attacks on elliptic curve cryptosystems. Proceedings 5th Annual International Workshop, *Selected Areas in Cryptography: SAC’98*.

Citation

Copyright

Authors retain copyright. This work is licensed under a Creative Commons Attribution 4.0 International License

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Most read articles

Abstracting, Indexing & Archiving

Partners