Ognjen Milivojević, Boris Damjanović
Pan-European University “Apeiron”, Faculty for Information Technologies, vojvode Pere Krece, 78000 Banja Luka, Bosnia and Herzegovina, ognjenmili1993@gmail.com
PROFESSIONAL PAPER
ISSN 2637-2150
e-ISSN 2637-2614
UDC 514.112/.113:316.647.5
DOI 10.7251/STED2302084M
COBISS.RS-ID 13942988
Paper Submited: 03.10.2023.
Paper Accepted: 17.11.2023.
Paper Published: 29.11.2023.
http://stedj-univerzitetpim.com
Corresponding Author: Ognjen Milivojević, Pan-European University “Apeiron”, Faculty for Information Technologies, vojvode Pere Krece, 78000 Banja Luka, Bosnia and Herzegovina, ognjenmili1993@gmail.com
Copyright © 2022 Ognjen Milivojević & Boris Damjanović; published by UNIVERSITY PIM. This work licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 4.
ABSTRACT
Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat’s last theorem. They are also connected with many hypotheses and problems in mathematics that have yet to be solved. Elliptic curves defined over finite fields are widely used in public key cryptography, since they have proven to be groups that have the best properties for implementing the Diffie-Hellman protocol. This article provides an overview of the theoretical assumptions that are necessary for the development of cryptographic algorithms based on elliptic curve cryptography, which includes defining elliptic curves, defining the properties of arithmetic operations on elliptic curves used in cryptography with reference to curves defined over finite fields.
Keywords: elliptic curve, Weierstrass form, finite fields, groups