Application of elliptic curves in cryptography

Authors

  • Feruza Toshboyeva
  • Baxtiyor Abduraximov
  • Ilxom Boyquziyev

Keywords:

elliptik egri chiziqlar, ECC, diskret logarifm muammosi, ECDH, ECDSA, EdDSA, post-kvant kriptografiya, xavfsizlik.

Abstract

This article analyzes cryptographic algorithms based on elliptic curves (ECC) and their effectiveness. The main complexity of ECC is due to the difficulty of solving the discrete logarithm problem, which provides a high level of security in modern computing technologies. The article presents a comparative analysis of ECC algorithms, highlights their advantages, weaknesses, and areas of practical application. It also provides recommendations for existing attacks on ECC algorithms and their prevention. Since the development of quantum computers in the future may threaten the security of ECC, the article also provides strategic recommendations for the transition to post-quantum cryptography

References

Koblitz, N. (1987). "Elliptic curve cryptosystems". Mathematics of Computation, 48(177), 203-209.

Miller, V. (1985). "Use of elliptic curves in cryptography". Advances in Cryptology - CRYPTO’85, Lecture Notes in Computer Science, 218, 417-426.

Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer.

Shor, P. (1997). "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer". SIAM Journal on Computing, 26(5), 1484-1509.

National Institute of Standards and Technology (NIST). (2013). Recommendation for Key Management - Part 1: General. Special Publication 800-57.

Darrel Hankerson, Alfred Menezes, Scott Vanstone, Guide to Elliptic Curve Cryptography, Springer, 2004.

Nigel Smart, Cryptography: An Introduction, McGraw-Hill, 2003.

Daniel J. Bernstein, Tanja Lange, "SafeCurves: Choosing Safe Parameters for ECC", 2014.

Ian F. Blake, Gadiel Seroussi, Nigel P. Smart, Elliptic Curves in Cryptography, Cambridge University Press, 1999.

Steven Galbraith, Mathematics of Public Key Cryptography, Cambridge University Press, 2012.

NIST Special Publication 800-186, Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters, National Institute of Standards and Technology, 2019.

Douglas R. Stinson, Maura Paterson, Cryptography: Theory and Practice, CRC Press, 2018.

RFC 7748, Elliptic Curves for Security (by Adam Langley, Mike Hamburg, Sean Turner), Internet Engineering Task Force (IETF), 2016

Published

2025-06-02

How to Cite

Toshboyeva, F., Abduraximov, B., & Boyquziyev, I. (2025). Application of elliptic curves in cryptography. The Descendants of Al-Fargani, (2), 61–65. Retrieved from http://al-fargoniy.uz/index.php/journal/article/view/832