flexibility and uses a smaller key size for the same
level of security (ChavhanAssist, 2020) (Amara and
Siad, 2011) (Xiao et.al, 2021). As the security level
rises, the key lengths of existing encryption
techniques increase exponentially, while ECC key
lengths only increase linearly. For instance, a 3,072-
bit RSA key is needed for 128-bit secure encryption,
whereas just a 256-bit ECC key is needed. Second,
exponentiation and prime numbers are not needed for
ECC. Since ECC is based on elliptic curve theory, it
does not require the generation of large prime
numbers or exponential operations for its algorithmic
implementation, which primarily consists of adding
and multiplying points defined on elliptic curves. In
contrast, the RSA algorithm depends on these
mathematical operations (Yang and Ming, 2014).
In this way, ECC bypasses the complex process of
dealing with mathematical problems, thus
simplifying the computational process of encryption
and decryption. Finally, ECC provides significant
bandwidth savings. ECC's encryption function is
particularly efficient when processing short messages
and can significantly reduce the required bandwidth.
This is particularly valuable in application scenarios
where network communication is frequent (Ghosh
et.al, 2020). However, ECC has some drawbacks;
ECC is based on complex mathematical principles
involving the addition and multiplication of elliptic
curve points over a finite field. This complexity
makes it more challenging to implement ECC
correctly and securely than it is to implement RSA
based on the multiplication of large integers.
Incorrect implementations can lead to serious security
vulnerabilities, such as side-channel attacks or
incorrect random number generation, among other
problems. RSA has a long history of application and
a relatively easy-to-understand mathematical
foundation; therefore, it is more accepted and trusted
than ECC. At the same time, although ECC provides
a higher secure unit key length than RSA, it is still
theoretically under threat from future quantum
computing.
4 CONCLUSIONS
This study explored the role of ECC in cryptography
and blockchain technology, focusing on its
development, core technologies, and prospects,
particularly in blockchain systems such as Bitcoin.
Through a detailed analysis of blockchain security
mechanisms, the study examined applications in
digital signatures, key exchanges, and data encryption
within blockchain environments. The smaller key
sizes and improved efficiency make it a strong
alternative to traditional algorithms like RSA. The
research evaluated mathematical foundations and
their practical implementation in blockchain use
cases, comparing their performance to other
cryptographic methods. The findings indicate that
ECC delivers superior security and efficiency
compared to RSA and other schemes, particularly due
to its lower computational overhead. Nevertheless,
the study also recognized several obstacles linked to
ECC, such as implementation difficulties and
possible weaknesses in quantum computing. Future
research will focus on enhancing resilience to
quantum computing threats. This will involve
improving security measures and exploring
alternative cryptographic techniques to address its
limitations. Additionally, ECC's integration into
broader applications, such as the Internet of Things
(IoT), and its further development within blockchain
technologies will be key areas of exploration.
REFERENCES
Amara, M., & Siad, A. 2011. Elliptic Curve Cryptography
and its applications. In International Workshop on
Systems, Signal Processing and their Applications,
247-250.
Chandra, S., Paira, S., Alam, S.S., et al. 2014. A
comparative survey of symmetric and asymmetric key
cryptography. International conference on electronics,
communication and computational engineering, 83-93.
ChavhanAssist, S.J., 2020. On study of some asymmetric
key cryptography algorithms. International Journal of
Advance Research and Innovative Ideas in Education,
6(2), 671-676.
Conti, M., et al. 2018. A Survey on Security and Privacy
Issues of Bitcoin. IEEE Communications Surveys and
Tutorials, 20(4), 3416-3452.
Gamage, H.T.M., et al. 2020. A Survey on Blockchain
Technology Concepts, Applications, and Issues. SN
Computer Science, 1(2), 114.
Ghosh, A., et al. 2020. Security of Cryptocurrencies in
blockchain technology: State-of-art, challenges, and
future prospects. Journal of Network and Computer
Applications, 163.
Jao, D., 2010. Elliptic curve cryptography. Handbook of
information and communication security, 35-57.
Joppe, W., Bos, et al. 2014. Elliptic Curve Cryptography in
Practice. Lecture Notes in Computer Science, 8437,
157-175.
Koblitz, N., 1987. Elliptic curve cryptosystems.
Mathematics of Computation, 48 (1987), 203-209.
Kumar, S., et al. 2020. A survey on Symmetric and
Asymmetric Key based Image Encryption. IEEE
International Conference on Data Engineering, 1-5.