Combined Matrix-Block Encryption Algorithm Using Elliptic Curves
https://doi.org/10.25205/1818-7900-2025-23-4-74-93
Abstract
The article examines a block cryptographic algorithm using a two-component shared secret key obtained according to the Diffie-Hellman key exchange principle on elliptic curve points over the field Zp. The goal is to eliminate shortcomings of individual classical algorithms and, through their combination, increase overall system strength. Key generation and exchange between users are carried out using elliptic curve cryptographic systems with public key. Two methods are proposed for generating shared secret keys for interacting users: applying the Diffie-Hellman cryptographic protocol on multiple elliptic curve points or additionally using a recurrence formula. Encryption elements are represented by blocks as square matrices constructed on elliptic curve point coordinates. Encryption proceeds in two stages: the first uses stream cipher with scalar multiplication of elliptic curve points, and the second involves forming matrix blocks and performing Hill matrix transformation with feedback. Each encryption stage utilizes its corresponding component of the users’ shared secret key: a numerical gamma sequence or a square key matrix. The cryptographic strength is based on the computational complexity of solving the discrete logarithm problem on elliptic curves and the security of the sharing service with secure authentication of interacting users. The block implementation of the second encryption stage ensures the system’s resistance to frequency analysis. As an illustration of the presented algorithm’s operation, the article provides a step-by-step example of encrypting/decrypting a text message.
About the Authors
O. A. SergeevaRussian Federation
Olga A. Sergeeva, Candidate of Physical and Mathematical Sciences, Associate Professor, Department of Fundamental Mathematics
Kemerovo
A. S. Kutovaya
Russian Federation
Anastasia S. Kutovaya, Master’s degree holder, teacher of mathematics and informatics Secondary General Education School No. 31 named after V. D. Martemyanov
Kemerovo
V. S. Sergeev
Russian Federation
Vladislav S. Sergeev, Second-year master’s student at the Department of Fundamental Mathematics
Kemerovo
References
1. Svechnikov S. N. Frequency analysis in the application of classical cryptographic algorithms. Innovations in Science and Practice. Ufa: LLC “Scientific Publishing Center “Vestnik Nauki””, 2020, p. 57–62.
2. Sergeeva O. A., Kutovaya A. S. Fundamentals of cryptography: educational and methodological guide [Electronic resource]; Kemerovo State University. Electronic data (2.26 MB). Kemerovo: KemSU, 2024. System requirements: Intel Pentium (or similar processor from other manufacturers), 1.2 GHz; 512 MB RAM; SVGA video card, 1280x1024 High Color (32 bit); 2 MB free disk space; Windows XP operating system or higher; Adobe Reader. Title from screen, State registration No.: 0322400576, 26.02.2024.
3. Zémor G. A course in cryptography. Moscow-Izhevsk: SRC “Regular and Chaotic Dynamics”, 2019. 256 p.
4. Gulevich S. A. General information about modern cryptography and approaches to its study. RATIO ET NATURA. 2022. No. 2 (6).
5. Kuznetsov A. V., Shishkina E. L. Methods of algebraic geometry in cryptography: textbook. Voronezh: VSU Publishing House, 2023. 125 p.
6. Zhdanov O. N., Chalkin V. A. Elliptic curves and their application in cryptography: textbook. Krasnoyarsk: SibSAU, 2011. 65 p.
7. Zhdanov O. N., Chalkin T. A. Elliptic curves. Fundamentals of theory and cryptographic applications. Moscow: URSS: Librokom, 2020. 200 p.
8. Kutovaya A. S., Sergeeva O. A. Combined block encryption algorithm with public key based on elliptic curve. In: Fundamental and Applied Research in Physics, Chemistry, Mathematics and Computer Science. Proceedings of the Symposium of the XIX (LI) International Scientific Conference of Students, Graduate Students and Young Scientists, Kemerovo, 2024. Kemerovo: Kemerovo State University, 2024, p. 151–154.
9. Streltsova A. S., Ukhvarkin S. P., Filimonov V. V. Application of elliptic curves in the Diffie- Hellman algorithm. Scientific Almanac. 2019, no. 1-3 (51), p. 62–64.
10. Gushchin A. V., Osipov M. N. Cryptographic methods of information protection: textbook / A. V. Gushchin, M. N. Osipov. Samara: Samara University Publishing House, 2024. 126 p.
11. Kutovaya A. S. Matrix algorithms for cryptographic information protection. Fundamental and Applied Research in Physics, Mathematics and Computer Science. Kemerovo: Kemerovo State University, 2022, p. 171–174.
12. Munerman V. I. Implementation of the Hill encryption algorithm based on the algebra of multidimensional matrices. Highly Available Systems. 2019, vol. 15, no. 1, рp. 21–27.
13. Zhukov A. E. Block cipher systems: textbook for the course “Cryptographic methods of information protection”. Moscow: Bauman MSTU Publishing House, 2013. 79 p.
14. Karpov A. V., Ishmuratov R. A. Introduction to cryptography: textbook. Kazan: Kazan University, 2024. 128 p.
15. Moldovyan A. A., Moldovyan D. N., Levina A. B. Zero-knowledge authentication protocols: textbook. St. Petersburg: ITMO University, 2016. 55 p.
16. Semaev I. A. On the computation of logarithms on elliptic curves. Discrete Mathematics and Applications. 1996, vol. 8, no. 1, рp. 65–71.
17. 13 services for secure shared access and file URL: https://www.securitylab.ru/blog/company/PandaSecurityRus/351556.php (accessed: 23.09.2025).
Review
For citations:
Sergeeva O.A., Kutovaya A.S., Sergeev V.S. Combined Matrix-Block Encryption Algorithm Using Elliptic Curves. Vestnik NSU. Series: Information Technologies. 2025;23(4):74-93. (In Russ.) https://doi.org/10.25205/1818-7900-2025-23-4-74-93
JATS XML


