Proposal of an End-to-End Encrypted Chat System with Digital Signature and Vietnamese Character Support Based on Elliptic Curve
DOI:
https://doi.org/10.54654/isj.v3i26.1158Keywords:
E2EE, ECC, ECDSA, ECDH, Vietnamese support, web widgetTóm tắt
The paper proposes an End-to-End Encrypted (E2EE) chat system based on Elliptic Curve Cryptography (ECC), using Elliptic Curve Digital Signature Algorithm (ECDSA) for authentication and Elliptic Curve Diffie-Hellman (ECDH) for encryption key generation. The system is designed as a lightweight web widget, easily embeddable into websites, with full support for Vietnamese characters (UTF-8) without compromising performance. The solution employs the Web Crypto API to perform AES-GCM encryption and ECDSA digital signatures, combined with a nonce mechanism to prevent replay attacks. Experimental results demonstrate high performance (encryption/decryption time <1ms for long messages) and resilience against MITM and spoofing attacks.
Downloads
References
Miller, V.S., 1985. Uses of elliptic curves in cryptography. In: Williams, H.C. (Ed.), Advances in Cryptology - CRYPTO '85 Proceedings. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg, pp. 417-426.
Koblitz, N., 1998. An elliptic curve implementation of the finite field digital signature algorithm. In: Krawczyk, H. (Ed.), Advances in Cryptology - CRYPTO '98. Lecture Notes in Computer Science, vol 1462. Springer, Berlin, Heidelberg, pp. 327-337.
Hankerson, D., Menezes, A.J., Vanstone, S., 2004. Guide to Elliptic Curve Cryptography. Springer-Verlag, New York. ISBN 978-0-387-95273-4.
Koblitz, N., 1987. Elliptic curve cryptosystems. Mathematics of Computation, 48(177), pp. 203-209.
Ulla, M.M., Sakkari, D.S., 2023. Research on elliptic curve crypto system with Bitcoin curves - SECP256k1, NIST256p, NIST521p and LLL. Journal of Cyber Security and Mobility, 12(1), pp. 1-20.
Gayoso Martínez, V., Hernández Encinas, L., Sánchez Ávila, C., 2010. A Java implementation of the elliptic curve integrated encryption scheme. In: Proceedings of the 2010 International Conference on Security and Management (SAM'10), July 12-15, 2010, Las Vegas, Nevada, USA. CSREA Press, pp. 467-473.
Di Scala, A.J., Gangemi, A., Romeo, G., Vernetti, G., 2022. Special subsets of addresses for blockchains using the secp256k1 curve. Mathematics, 10(15), 2746.
Ouyang, X., Liu, J., Luo, Y., Cao, L., 2019. Image encryption method based on elliptic curve ElGamal encryption and chaotic systems. IEEE Access, 7, pp. 38507-38515.
Azam, N.A., Hayat, U., Ullah, I., Azhar, S., 2022. A novel image encryption scheme based on elliptic curves over finite rings. Mathematics, 10(9), 1529.
Balasubramanian, K., 2024. Security of the secp256k1 elliptic curve used in the Bitcoin blockchain. Indian Journal of Cryptography and Network Security, 4(1), pp. 1-10.
Trung, M.M., Do, L.P., Tuan, D.T., Tanh, N.V., Tri, N.Q., 2023. Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key. International Journal of Electrical and Computer Engineering, 13(2), pp. 1734-1743.
Trung, M.M., Tuan, D.T., Do, L.P., 2020. Building an elliptic curve cryptography to encode and decode Vietnamese texts. VNU Journal of Science: Computer Science and Communication Engineering, 36(2), pp. 44-51.
Tanh, N.V., Tri, N.Q., Trung, M.M., 2021. The solution to improve information security for IoT networks by combining lightweight encryption protocols. Indonesian Journal of Electrical Engineering and Computer Science, 23(3), pp. 1727-1735.
Trung, M.M., Tuan, D.T., Do, L.P., 2022. Building elliptic curve cryptography with public key to encrypt Vietnamese text. Journal of Science and Technology on Information Security, 1(5), pp. 119-126. ISSN 1859-4925.
Mai, M.T., Le, P.D., Le, T.T., Dao, T.P.A., 2020. Proposing an elliptic curve cryptosystem with the symmetric key for Vietnamese text encryption and decryption. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), pp. 4158-4162.
Aaron Ethan Cohen and Keshab K. Parhi, "Fast Reconfigurable Elliptic Curve Cryptography Acceleration for GF(2^m)," Journal of Signal Processing Systems, vol. 62, pp. 31–45, Springer, 2010.
Dimas Natanael, Faisal and Dewi Suryani, "Secured Chat Application Using ECC Encryption Algorithm in Android," Procedia Computer Science, vol. 132, pp. 283–291, 2018.
Rolla Subrahmanyam, Y. V. Subba Rao, N. Rukma Rekha, "Signcryption Using ECDSA and Paillier Cryptosystem," in Proc. Int. Conf. on Intelligent Computing and Communication Technologies (ICICCT), pp 611–619, 2019, Springer.
Xiaoyuan Yang, Maotang Li, Lixian Wei, Yiliang Han, "ECDSA-Verifiable Signcryption Scheme," in Proc. Int. Workshop on Information Security and Cryptology – Inscrypt 2007, LNCS 4990, pp. 27–38, Springer, 2008.
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "Efficient and Secure ECDSA Algorithm: A Survey," arXiv preprint, arXiv:1902.10313, 2019.
Thành, Đ.T., Toan, N.Q., Son, N.V., Duan, N.V., 2022. An algorithm to select a secure twisted elliptic curve in cryptography. Hội thảo Nghiên cứu ứng dụng Mật Mã Và An toàn thông tin, 1(15), pp. 17-25.
Van, V.T., Dung, L.T., Quan, H.V., Luong, T.T., Tho, H.D., 2022. Privacy-Preserving Decision Tree Solution in the 2-Part Fully Distributed Setting. Journal of Science and Technology on Information Security, 1(15), pp. 92-101. https://doi.org/10.54654/isj.v1i15.848.
Phong, T.Q., Chi, D.D., Huy, T.D., Diep, N.N., 2023. On some issues affecting the security of RSA and ECDSA digital signature schemes. Journal of Science and Technology on Information Security, 1(18), pp. 38-46. https://doi.org/10.54654/isj.v1i18.884.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).










