Java library designed to work with elliptic curves
Journal Title: Modern Innovations, Systems and Technologies - Year 2023, Vol 3, Issue 2
Abstract
Currently, elliptical cryptography is actively used in SSH protocols, in cryptocurrencies, in electronic voting protocols and in many other areas. In such information systems, emphasis is placed on a high level of security and increased performance of the cryptographic primitives used, which determines the relevance of the analysis and implementation of various methods of elliptic cryptography. This article describes a cryptographic library developed for the Java language for working with elliptic curves. The library contains the implementation of basic operations for such forms of curves as: canonical Weierstrass curve, Edwards curve, Jacobi quartic. Functionality was implemented for various coordinate representations of points, as well as scalar multiplication algorithms such as: NAF, mbNAF and their “window” variants, the Montgomery ladder. A comparison of the performance of the implementation of the ECDSA electronic digital signature standard with the existing solution from the java.security package is given.
Authors and Affiliations
V. D. Khazieva
Method for estimating the informativity contained in a hydroacoustic signal
The analysis of sound transmitted underwater for research purposes has a long and extensive history of successful applications, especially in the marine environment, where most of the major research developments in this...
Protection of speech information in scientific organizations against leakage through technical channels
The protection of speech information from leakage through technical channels is a crucial concern in today's digital age. With the increasing reliance on technology and the internet for communication, ensuring the confid...
Features of wave propagation in viscous media in pipes
This article presents research on wave propagation, specifically focusing on their propagation in half-spaces, at the contact between two bodies, as well as in various plate-like and cylindrical forms. In the region of l...
IT solutions architecture model: creation, generation of solutions
Possible decisions on the construction of the architecture of IT solutions are considered based on the application of the principles of causality, bifurcations and cognition, as well as technologies for constructing scen...
Parameters of roll contact curves of two-roll modules
Analytical dependencies were obtained to calculate the lengths of roll contact curves, the lengths of the slip and no-slip zones, and angles that determine the position of the separation points of these zones. It was rev...