Modeling arithmetic systems of elliptic curve cryptography using Microsoft Excel VBA

User Rating:  / 0


I.Syamsuddin*,, Politeknik Negeri Ujung Pandang, Makassar, Indonesia

S.Syafaruddin,, Universitas Hasanuddin, Makassar, Indonesia

* Corresponding author e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

повний текст / full article

Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2024, (1): 162 - 166


This study aims to develop a new teaching module to illustrate the arithmetic systems of Elliptic Curve Cryptography, a powerful yet simple algorithm for information security, by exploring the capability of the Visual Basic Applications of Microsoft Excel in user friendly way.

The research is performed using research and development approach, which is divided into five steps utilizing VBA features of Microsoft Excel. It starts with modeling arithmetic in Microsoft Excel spreadsheet, then testing the validity through calculation and setup of the actual arithmetic of Elliptic Curve Cryptography using VBA Excel, before performing the test of the VBA application and finally visualizes the results in graphical mode.

Novel teaching software based on of Microsoft Excel Visual Basic Applications is produced that is able to simulate arithmetic system behind Elliptic Curve Cryptography in an easy way for students.

To the best of the authors’ knowledge, this is the first simulation based on Excel VBA to illustrate the arithmetic systems of Elliptic Curve Cryptography for teaching purposes.

Practical value.
In general, mastering cryptography will need a steep learning curve; however, using Microsoft Excel as a simulation platform will accelerate learning. The main practical value is the ease of Microsoft Excel, which will turn cryptography learning which was commonly very difficult for student to become easier and user friendly.

educational process, elliptic curve cryptography, arithmetic system, Microsoft Excel, Visual Basic Applications


1. Furnell, S., & Bishop, M. (2020). Addressing cyber security skills: the spectrum, not the silo. Computer Fraud & Security, 2020(2), 6-11.

2. Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201.

3. Varma, C. (2018). A study of the ECC, RSA and the diffie-Hellman algorithms in network security. 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT). IEEE.

4. Mallouli, F., Hellal, A., Sharief Saeed, N., & Abdulraheem Alzahrani, F. (2019). A survey on cryptography: Comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. 2019 6 th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5 th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE.

5. Bafandehkar, M., Yasin, S. M., Mahmod, R., & Hanapi, Z. M. (2013, December). Comparison of ECC and RSA algorithm in resource constrained devices. In 2013 international conference on IT convergence and security (ICITCS), (pp. 1-3). IEEE.

6. Hankerson, D. (2004). Guide to Elliptic Curve Cryptography. New York: Springer-Verlag.

7. Sen (2017). Implementing elliptic curve cryptography using Microsoft excel. Issues In Information Systems, 18(2), 103-112.

8. Islam, M. M., Hossain, M. S., Hasan, M. K., Shahjalal, M., & Jang, Y. M. (2019). FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field. IEEE Access, 7, 178811-178826.

9. Ullah, S., Zheng, J., Din, N., Hussain, M. T., Ullah, F., & Yousaf, M. (2023). Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Computer Science Review, 47(100530), 100530.

10. Palaniyappan, K., & Suresh, D. (2021). An Efficient Cluster Based Secure Packet Transmission Using Improved Polynomial Based Elliptical Curve Cryptography in Wireless Sensor Networks. Journal of Computational and Theoretical Nanoscience, 18(3), 796-804.

11. Shukla, S., Thakur, S., & Breslin, J. G. (2021). Secure communication in smart meters using elliptic curve cryptography and digital signature algorithm. 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE.

12. Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wireless Personal Communications, 121(1), 503-526.

13. Dua, A., Kumar, N., Singh, M., Obaidat, M. S., & Hsiao, K.-F. (2016). Secure message communication among vehicles using elliptic curve cryptography in smart cities. 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE.

14. Chatzigiannakis, I., Vitaletti, A., & Pyrgelis, A. (2016). A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Computer Communications, 89-90, 165-177.

15. Arunkumar, R., Velmurugan, S., Chinnaiah, B., Charulatha, G., Prabhu, M. R., & Chakkaravarthy, A. P. (2023). Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT. Computer Systems Science & Engineering, 46(1).

16. He, D., & Zeadally, S. (2015). An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal, 2(1), 72-83.

17. Christo, M. S., Jesi, V. E., Priyadarsini, U., Anbarasu, V., Venugopal, H., & Karuppiah, M. (2021). Ensuring improved security in medical data using ECC and blockchain technology with edge devices. Security and Communication Networks, 2021, 1-13.

18. Kumari, A., Kumar, V., Abbasi, M. Y., Kumari, S., Chaudhary, P., & Chen, C.-M. (2020). CSEF: Cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access: Practical Innovations, Open Solutions, 8, 107838-107852.

19. Azath, H., Gokulraj, J., Surendiran, J., Geetha, D., & Babu, T. R. G. (2023). Security for health information by elliptical curve Diffie-Hellman and improve energy efficiency in WBAN. AIP Conference Proceedings. AIP Publishing.

20. Syamsuddin, I. (2018). Evaluation of NgeXTEA: A cryptography learning module. Global Journal of Engineering Education, 20(3), 196-200.



This Month
All days

Guest Book

If you have questions, comments or suggestions, you can write them in our "Guest Book"

Registration data

ISSN (print) 2071-2227,
ISSN (online) 2223-2362.
Journal was registered by Ministry of Justice of Ukraine.
Registration number КВ No.17742-6592PR dated April 27, 2011.


D.Yavornytskyi ave.,19, pavilion 3, room 24-а, Dnipro, 49005
Tel.: +38 (056) 746 32 79.
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
You are here: Home Authors and readers journal headlines EngCat Archive 2024 Content №1 2024 Modeling arithmetic systems of elliptic curve cryptography using Microsoft Excel VBA