Modeling arithmetic systems of elliptic curve cryptography using Microsoft Excel VBA
- Details
- Category: Content №1 2024
- Last Updated on 29 February 2024
- Published on 30 November -0001
- Hits: 2083
Authors:
I.Syamsuddin*, orcid.org/0000-0002-6017-7364, Politeknik Negeri Ujung Pandang, Makassar, Indonesia
S.Syafaruddin, orcid.org/0000-0002-9915-7694, Universitas Hasanuddin, Makassar, Indonesia
* Corresponding author e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2024, (1): 162 - 166
https://doi.org/10.33271/nvngu/2024-1/162
Abstract:
Purpose. This study aims to develop a new teaching module to illustrate the arithmetic systems of Elliptic Curve Cryptography, a powerful yet simple algorithm for information security, by exploring the capability of the Visual Basic Applications of Microsoft Excel in user friendly way.
Methodology. The research is performed using research and development approach, which is divided into five steps utilizing VBA features of Microsoft Excel. It starts with modeling arithmetic in Microsoft Excel spreadsheet, then testing the validity through calculation and setup of the actual arithmetic of Elliptic Curve Cryptography using VBA Excel, before performing the test of the VBA application and finally visualizes the results in graphical mode.
Findings. Novel teaching software based on of Microsoft Excel Visual Basic Applications is produced that is able to simulate arithmetic system behind Elliptic Curve Cryptography in an easy way for students.
Originality. To the best of the authors’ knowledge, this is the first simulation based on Excel VBA to illustrate the arithmetic systems of Elliptic Curve Cryptography for teaching purposes.
Practical value. In general, mastering cryptography will need a steep learning curve; however, using Microsoft Excel as a simulation platform will accelerate learning. The main practical value is the ease of Microsoft Excel, which will turn cryptography learning which was commonly very difficult for student to become easier and user friendly.
Keywords: educational process, elliptic curve cryptography, arithmetic system, Microsoft Excel, Visual Basic Applications
References.
1. Furnell, S., & Bishop, M. (2020). Addressing cyber security skills: the spectrum, not the silo. Computer Fraud & Security, 2020(2), 6-11. https://doi.org/10.1016/s1361-3723(20)30017-8.
2. Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917.
3. Varma, C. (2018). A study of the ECC, RSA and the diffie-Hellman algorithms in network security. 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT). IEEE. https://doi.org/10.1109/ICCTCT.2018.8551161.
4. Mallouli, F., Hellal, A., Sharief Saeed, N., & Abdulraheem Alzahrani, F. (2019). A survey on cryptography: Comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. 2019 6 th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5 th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE. https://doi.org/10.1109/CSCloud/EdgeCom.2019.00022.
5. Bafandehkar, M., Yasin, S. M., Mahmod, R., & Hanapi, Z. M. (2013, December). Comparison of ECC and RSA algorithm in resource constrained devices. In 2013 international conference on IT convergence and security (ICITCS), (pp. 1-3). IEEE. https://doi.org/10.1109/ICITCS.2013.6717816.
6. Hankerson, D. (2004). Guide to Elliptic Curve Cryptography. New York: Springer-Verlag. https://doi.org/10.1007/b97644.
7. Sen (2017). Implementing elliptic curve cryptography using Microsoft excel. Issues In Information Systems, 18(2), 103-112. https://doi.org/10.48009/2_iis_2017_103-112.
8. Islam, M. M., Hossain, M. S., Hasan, M. K., Shahjalal, M., & Jang, Y. M. (2019). FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field. IEEE Access, 7, 178811-178826.
9. Ullah, S., Zheng, J., Din, N., Hussain, M. T., Ullah, F., & Yousaf, M. (2023). Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Computer Science Review, 47(100530), 100530. https://doi.org/10.1016/j.cosrev.2022.100530.
10. Palaniyappan, K., & Suresh, D. (2021). An Efficient Cluster Based Secure Packet Transmission Using Improved Polynomial Based Elliptical Curve Cryptography in Wireless Sensor Networks. Journal of Computational and Theoretical Nanoscience, 18(3), 796-804. https://doi.org/10.1166/jctn.2021.9673.
11. Shukla, S., Thakur, S., & Breslin, J. G. (2021). Secure communication in smart meters using elliptic curve cryptography and digital signature algorithm. 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE. https://doi.org/10.1109/CSR51186.2021.9527947.
12. Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wireless Personal Communications, 121(1), 503-526. https://doi.org/10.1007/s11277-021-08647-1.
13. Dua, A., Kumar, N., Singh, M., Obaidat, M. S., & Hsiao, K.-F. (2016). Secure message communication among vehicles using elliptic curve cryptography in smart cities. 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE. https://doi.org/10.1109/CITS.2016.7546385.
14. Chatzigiannakis, I., Vitaletti, A., & Pyrgelis, A. (2016). A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Computer Communications, 89-90, 165-177. https://doi.org/10.1016/j.comcom.2016.03.014.
15. Arunkumar, R., Velmurugan, S., Chinnaiah, B., Charulatha, G., Prabhu, M. R., & Chakkaravarthy, A. P. (2023). Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT. Computer Systems Science & Engineering, 46(1). https://doi.org/10.32604/csse.2023.031605.
16. He, D., & Zeadally, S. (2015). An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal, 2(1), 72-83. https://doi.org/10.1109/jiot.2014.2360121.
17. Christo, M. S., Jesi, V. E., Priyadarsini, U., Anbarasu, V., Venugopal, H., & Karuppiah, M. (2021). Ensuring improved security in medical data using ECC and blockchain technology with edge devices. Security and Communication Networks, 2021, 1-13. https://doi.org/10.1155/2021/6966206.
18. Kumari, A., Kumar, V., Abbasi, M. Y., Kumari, S., Chaudhary, P., & Chen, C.-M. (2020). CSEF: Cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access: Practical Innovations, Open Solutions, 8, 107838-107852. https://doi.org/10.1109/access.2020.3001152.
19. Azath, H., Gokulraj, J., Surendiran, J., Geetha, D., & Babu, T. R. G. (2023). Security for health information by elliptical curve Diffie-Hellman and improve energy efficiency in WBAN. AIP Conference Proceedings. AIP Publishing. https://doi.org/10.1063/5.0110677.
20. Syamsuddin, I. (2018). Evaluation of NgeXTEA: A cryptography learning module. Global Journal of Engineering Education, 20(3), 196-200. https://doi.org/10.5281/zenodo.2539847.
Newer news items:
- Ecological and economic assessment of the effectiveness of implementing bioenergy technologies in the conditions of post-war recovery of Ukraine - 29/02/2024 15:00
- Investment policy of construction enterprises under the conditions of marital state - 29/02/2024 15:00
- Modeling the return on investment in human capital in the IT industry of Ukraine - 29/02/2024 15:00
- Regional features of Ukrainian higher education in wartime conditions - 29/02/2024 15:00
- Gross regional product in Ukraine: two-dimensional analysis of regularities and territorial features - 29/02/2024 15:00
- Organizational and legal principles of information security of enterprises in the conditions of martial law in Ukraine - 29/02/2024 15:00
Older news items:
- Implementation of corporate social responsibility in the context of integration with the enterprise management information system - 29/02/2024 15:00
- Improvement of the method of time rationing for assembling car groups on one track - 29/02/2024 15:00
- Digital economy: opportunities for transformation of entepreneurial structures - 29/02/2024 15:00
- Two-stage problems of optimal location and distribution of the humanitarian logistics system’s structural subdivisions - 29/02/2024 15:00
- Modeling pH changes and electrical conductivity in surface water as a result of mining activities - 29/02/2024 15:00
- Stochastic models of work and rest schedules - 29/02/2024 15:00
- Enhancement of sorption of the azoic dye (Azucryl Red) by natural and calcined hyper-aluminous kaolins - 29/02/2024 15:00
- Method of controlling the volume of combustion products at different boiler loads - 29/02/2024 15:00
- An overview of hydrogen production via reforming from natural gas - 29/02/2024 15:00
- Heuristic control of power consumption by up to 1000 V electrical loads at mining enterprises - 29/02/2024 15:00