PUBLIC KEY EXCHANGE AND SYMMETRIC CHOIR ENCRYPTION ALGORITHM BASED ON ELLIPTIC CURVE CRYPTOGRAPHY

Authors
  • Muhamediyeva D. T.

    Tashkent Institute of Irrigation and Agricultural Mechanization Engineers National Research University

    Author

  • Tagayev F. A.

    Tashkent Institute of Irrigation and Agricultural Mechanization Engineers National Research University

    Author

Keywords:
Elliptic curve cryptography, ECC, Diffie–Hellman key exchange, cryptography, information security, XOR encryption, Python programming, public key, public key cryptography.
Abstract

This article considers the process of secure key exchange based on Elliptic Curve Cryptography (ECC) and the algorithm for encrypting data using this key. In the study, a mechanism for generating a public key of the Diffie–Hellman type based on the operations of adding and multiplying points on an elliptic curve is implemented in the Python programming language. A public secret key is calculated between Alice and Bob by generating public and private keys. The process of encrypting and decrypting text data based on the generated public key is performed using the XOR symmetric algorithm. The proposed model can be an effective tool for explaining the principle of operation of cryptographic protocols, teaching cryptography, and modeling information security systems. The results of the study show the mechanism of operation of elliptic curve cryptography through small-parameter models and help to understand the theoretical foundations of modern secure communication protocols.

References

1.Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation. 1987, 48(177), 203–209.

2.Miller V. Use of elliptic curves in cryptography. Advances in Cryptology – CRYPTO. 1986, pp. 417–426.

3.Hankerson D., Menezes A., Vanstone S. Guide to Elliptic Curve Cryptography. Springer, 2004.

4.Stallings W. Cryptography and Network Security: Principles and Practice. Pearson, 2017.

5.Paar C., Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners. Springer, 2010.

6.Menezes A., Vanstone S., Oorschot P. Handbook of Applied Cryptography. CRC Press, 1996.

7.Bernstein D., Lange T. Elliptic curve cryptography. IEEE Security & Privacy. 2017, 15(3), 48–56.

Downloads
Published
2026-03-24
Section
Articles
License
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

How to Cite

PUBLIC KEY EXCHANGE AND SYMMETRIC CHOIR ENCRYPTION ALGORITHM BASED ON ELLIPTIC CURVE CRYPTOGRAPHY. (2026). Eureka Journal of Education & Learning Technologies, 2(3), 134-144. https://eurekaoa.com/index.php/2/article/view/644

Most read articles by the same author(s)