Proposal of an End-to-End Encrypted Chat System with Digital Signature and Vietnamese Character Support Based on Elliptic Curve

Authors

  • Nguyen Quoc Viet
  • Ngo Manh Cuong

DOI:

https://doi.org/10.54654/isj.v3i26.1158

Keywords:

E2EE, ECC, ECDSA, ECDH, Vietnamese support, web widget

Tóm tắt

The paper proposes an End-to-End Encrypted (E2EE) chat system based on Elliptic Curve Cryptography (ECC), using Elliptic Curve Digital Signature Algorithm (ECDSA) for authentication and Elliptic Curve Diffie-Hellman (ECDH) for encryption key generation. The system is designed as a lightweight web widget, easily embeddable into websites, with full support for Vietnamese characters (UTF-8) without compromising performance. The solution employs the Web Crypto API to perform AES-GCM encryption and ECDSA digital signatures, combined with a nonce mechanism to prevent replay attacks. Experimental results demonstrate high performance (encryption/decryption time <1ms for long messages) and resilience against MITM and spoofing attacks.

Downloads

Download data is not yet available.

References

Miller, V.S., 1985. Uses of elliptic curves in cryptography. In: Williams, H.C. (Ed.), Advances in Cryptology - CRYPTO '85 Proceedings. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg, pp. 417-426.

Koblitz, N., 1998. An elliptic curve implementation of the finite field digital signature algorithm. In: Krawczyk, H. (Ed.), Advances in Cryptology - CRYPTO '98. Lecture Notes in Computer Science, vol 1462. Springer, Berlin, Heidelberg, pp. 327-337.

Hankerson, D., Menezes, A.J., Vanstone, S., 2004. Guide to Elliptic Curve Cryptography. Springer-Verlag, New York. ISBN 978-0-387-95273-4.

Koblitz, N., 1987. Elliptic curve cryptosystems. Mathematics of Computation, 48(177), pp. 203-209.

Ulla, M.M., Sakkari, D.S., 2023. Research on elliptic curve crypto system with Bitcoin curves - SECP256k1, NIST256p, NIST521p and LLL. Journal of Cyber Security and Mobility, 12(1), pp. 1-20.

Gayoso Martínez, V., Hernández Encinas, L., Sánchez Ávila, C., 2010. A Java implementation of the elliptic curve integrated encryption scheme. In: Proceedings of the 2010 International Conference on Security and Management (SAM'10), July 12-15, 2010, Las Vegas, Nevada, USA. CSREA Press, pp. 467-473.

Di Scala, A.J., Gangemi, A., Romeo, G., Vernetti, G., 2022. Special subsets of addresses for blockchains using the secp256k1 curve. Mathematics, 10(15), 2746.

Ouyang, X., Liu, J., Luo, Y., Cao, L., 2019. Image encryption method based on elliptic curve ElGamal encryption and chaotic systems. IEEE Access, 7, pp. 38507-38515.

Azam, N.A., Hayat, U., Ullah, I., Azhar, S., 2022. A novel image encryption scheme based on elliptic curves over finite rings. Mathematics, 10(9), 1529.

Balasubramanian, K., 2024. Security of the secp256k1 elliptic curve used in the Bitcoin blockchain. Indian Journal of Cryptography and Network Security, 4(1), pp. 1-10.

Trung, M.M., Do, L.P., Tuan, D.T., Tanh, N.V., Tri, N.Q., 2023. Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key. International Journal of Electrical and Computer Engineering, 13(2), pp. 1734-1743.

Trung, M.M., Tuan, D.T., Do, L.P., 2020. Building an elliptic curve cryptography to encode and decode Vietnamese texts. VNU Journal of Science: Computer Science and Communication Engineering, 36(2), pp. 44-51.

Tanh, N.V., Tri, N.Q., Trung, M.M., 2021. The solution to improve information security for IoT networks by combining lightweight encryption protocols. Indonesian Journal of Electrical Engineering and Computer Science, 23(3), pp. 1727-1735.

Trung, M.M., Tuan, D.T., Do, L.P., 2022. Building elliptic curve cryptography with public key to encrypt Vietnamese text. Journal of Science and Technology on Information Security, 1(5), pp. 119-126. ISSN 1859-4925.

Mai, M.T., Le, P.D., Le, T.T., Dao, T.P.A., 2020. Proposing an elliptic curve cryptosystem with the symmetric key for Vietnamese text encryption and decryption. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), pp. 4158-4162.

Aaron Ethan Cohen and Keshab K. Parhi, "Fast Reconfigurable Elliptic Curve Cryptography Acceleration for GF(2^m)," Journal of Signal Processing Systems, vol. 62, pp. 31–45, Springer, 2010.

Dimas Natanael, Faisal and Dewi Suryani, "Secured Chat Application Using ECC Encryption Algorithm in Android," Procedia Computer Science, vol. 132, pp. 283–291, 2018.

Rolla Subrahmanyam, Y. V. Subba Rao, N. Rukma Rekha, "Signcryption Using ECDSA and Paillier Cryptosystem," in Proc. Int. Conf. on Intelligent Computing and Communication Technologies (ICICCT), pp 611–619, 2019, Springer.

Xiaoyuan Yang, Maotang Li, Lixian Wei, Yiliang Han, "ECDSA-Verifiable Signcryption Scheme," in Proc. Int. Workshop on Information Security and Cryptology – Inscrypt 2007, LNCS 4990, pp. 27–38, Springer, 2008.

M. Al-Zubaidie, Z. Zhang, and J. Zhang, "Efficient and Secure ECDSA Algorithm: A Survey," arXiv preprint, arXiv:1902.10313, 2019.

Thành, Đ.T., Toan, N.Q., Son, N.V., Duan, N.V., 2022. An algorithm to select a secure twisted elliptic curve in cryptography. Hội thảo Nghiên cứu ứng dụng Mật Mã Và An toàn thông tin, 1(15), pp. 17-25.

Van, V.T., Dung, L.T., Quan, H.V., Luong, T.T., Tho, H.D., 2022. Privacy-Preserving Decision Tree Solution in the 2-Part Fully Distributed Setting. Journal of Science and Technology on Information Security, 1(15), pp. 92-101. https://doi.org/10.54654/isj.v1i15.848.

Phong, T.Q., Chi, D.D., Huy, T.D., Diep, N.N., 2023. On some issues affecting the security of RSA and ECDSA digital signature schemes. Journal of Science and Technology on Information Security, 1(18), pp. 38-46. https://doi.org/10.54654/isj.v1i18.884.

Downloads

Abstract views: 236 / PDF downloads: 44

Published

2025-12-31

How to Cite

Viet , N. Q., & Cuong, N. M. (2025). Proposal of an End-to-End Encrypted Chat System with Digital Signature and Vietnamese Character Support Based on Elliptic Curve. Journal of Science and Technology on Information Security, 3(26), 39-49. https://doi.org/10.54654/isj.v3i26.1158

Issue

Section

Papers