Abstract

The article discusses cryptographic algorithms based on elliptic curves over finite fields. It is shown that elliptic curves allow us to construct examples of finite abelian groups for cryptographic purposes. By evaluating the field, you can easily increase the cipher strength. A variant of the software implementation of this approach is considered. A software-implemented protocol can encrypt messages, generate a digital signature, and after transmitting the message, decrypt them on the recipient's side. The evaluation of the cryptographic strength of the described protocol was made.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call