Systematic Analysis of Mathematical Fundamentals in Elliptic Curve Cryptography: Concepts, Applications, and Challenges
Abstract
This study aims to systematically analyze the mathematical fundamentals underpinning Elliptic Curve Cryptography (ECC) by reviewing its key concepts, applications, and challenges. Utilizing literature from Springer, Sagepub, and Mendeley databases, several essential mathematical concepts, such as the basic operations in ECC, including addition and multiplication. Furthermore, the challenges in solving the Elliptic Curve Discrete Logarithm Problem (ECDLP), which forms the foundation of ECC security, are discussed, along with the implementation of cryptographic protocols. This review also explores practical challenges in applying ECC to modern cryptographic systems, including key management and secure communications, and the theoretical implications of evolving algorithms. This article categorizes previous research into three main areas: (1) ECC concepts covering discussions on elliptic curves, cryptology, and pre-cryptological operations, (2) ECC applications in various encryption methods and models, such as the ECC encryption model, ECDSA, and ECDH, and (3) challenges in ECC implementation as a computational model. The results show that while the foundational algebraic theories supporting ECC have been developed, further research is required to enhance the effectiveness and efficiency of ECC in the future. This study serves as a groundwork for more in-depth research on algebraic structures in the formation of ECC.
Full Text:
PDFReferences
M. R. Khan et al., “Analysis of Elliptic Curve Cryptography & RSA,” J. ICT Stand., vol. 11, no. 4, pp. 355–378, 2023, doi: 10.13052/jicts2245-800X.1142.
S. Ullah, J. Zheng, N. Din, M. T. Hussain, F. Ullah, and M. Yousaf, “Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey,” Comput. Sci. Rev., vol. 47, p. 100530, 2023, doi: 10.1016/j.cosrev.2022.100530.
R. Soekarta and M. Sigit, “Implementation of Affine Group Algebra on Digital Image Security,” vol. 1, no. 1, pp. 137–146, 2020.
M. S. Rahmawati and R. Soekarta, “Penerapan Aljabar Pada Algoritma DES Dan Transformasi Wavelet Diskrit Dalam Program Aplikasi Keamanan Citra Digital ( Application Of Algebra In DES Algorithms And Discrete Wavelet Transform On Digital Image Security Application ),” 2018, pp. 812–818.
F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, pp. 442–448, 2017, doi: 10.14569/ijacsa.2017.080659.
K. L. Tan, A. K. S. Sim, S. S. N. Yap, S. Vithayaporn, and A. W. Rachmawati, “A systematic review of meaningful work unifying 20 years of theoretical and substantive contributions (2000–2020),” J. Adv. Manag. Res., vol. 20, no. 3, pp. 462–512, 2023, doi: 10.1108/JAMR-11-2022-0225.
V. Jara-Vera and C. Sánchez-ávila, “Some notes on a formal algebraic structure of cryptology,” Mathematics, vol. 9, no. 18, 2021, doi: 10.3390/math9182183.
Y. Hao et al., “Lightweight Architecture for Elliptic Curve Scalar Multiplication over Prime Field,” Electron., vol. 11, no. 14, pp. 1–24, 2022, doi: 10.3390/electronics11142234.
R. Sanjeewa and B. A. K. Welihinda, “Elliptic Curve Cryptography and Coding Theory,” Int. J. Multidiscip. Stud., vol. 3, no. 2, p. 99, 2017, doi: 10.4038/ijms.v3i2.12.
U. Hayat, I. Ullah, N. A. Azam, and S. Azhar, “A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings,” Entropy, vol. 24, no. 5, pp. 1–24, 2022, doi: 10.3390/e24050571.
G. Favre et al., “Elliptic Curve Cryptography and Coding Theory,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11, no. 1, pp. 1–24, 2022, doi: 10.4038/ijms.v3i2.12.
Y. B. W. Tama and M. F. Fahmi, “Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery,” Euler J. Ilm. Mat. Sains dan Teknol., vol. 11, no. 2, pp. 361–371, 2023, doi: 10.37905/euler.v11i2.23009.
D. Krenn et al., “Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme,” Semigr. Forum, vol. 104, no. August 2021, pp. 58–71, 2020, doi: 10.1145/3386723.3387893.
J. Renes, C. Costello, and L. Batina, “Complete addition formulas for prime order elliptic curves,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9665, pp. 403–428, 2016, doi: 10.1007/978-3-662-49890-3_16.
D. J. Unger, “Yield criteria representable by elliptic curves and Weierstrass form,” Procedia Struct. Integr., vol. 35, no. C, pp. 2–9, 2021, doi: 10.1016/j.prostr.2021.12.041.
K. Keerthi and B. Surendiran, “Elliptic curve cryptography for secured text encryption,” Proc. IEEE Int. Conf. Circuit, Power Comput. Technol. ICCPCT 2017, no. March, 2017, doi: 10.1109/ICCPCT.2017.8074210.
D. Natanael, Faisal, and D. Suryani, “Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC),” Procedia Comput. Sci., vol. 135, pp. 283–291, 2018, doi: 10.1016/j.procs.2018.08.176.
A. Pakapongpun and S. Srisuk, “On the Problem of Tangency of Ellipse Curve,” Asian J. Appl. Sci., vol. 6, no. 6, pp. 542–546, 2018, doi: 10.24203/ajas.v6i6.5534.
K. A. Sattar, T. Haider, U. Hayat, and M. D. Bustamante, “An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform,” Appl. Sci., vol. 13, no. 14, 2023, doi: 10.3390/app13148385.
B. N. Koblitz, “Elliptic Curve Cryptosystems,” vol. 4, no. 177, pp. 203–209, 1987.
V. S. Miller, “Elliptic Curves and their use in Cryptography,” Communications, pp. 1–14, 1997.
N. Sendrier, Code-Based Cryptography Post-Quantum Cryptography, no. February 2009. 2014.
R. Sanjeewa and B. A. K. Welihinda, “Elliptic Curve Cryptography and Coding Theory,” Int. J. Multidiscip. Stud., vol. 3, no. 2, p. 99, 2017, doi: 10.4038/ijms.v3i2.12.
Refbacks
- There are currently no refbacks.