CFP last date
20 February 2026
Call for Paper
March Edition
IJCA solicits high quality original research papers for the upcoming March edition of the journal. The last date of research paper submission is 20 February 2026

Submit your paper
Know more
Random Articles
Reseach Article

A Multi-Population Genetic Algorithm for Secure and Efficient Elliptic Curve Parameter Generation

by Mohammed H. Alabiech
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 84
Year of Publication: 2026
Authors: Mohammed H. Alabiech
10.5120/ijca2026926478

Mohammed H. Alabiech . A Multi-Population Genetic Algorithm for Secure and Efficient Elliptic Curve Parameter Generation. International Journal of Computer Applications. 187, 84 ( Feb 2026), 53-58. DOI=10.5120/ijca2026926478

@article{ 10.5120/ijca2026926478,
author = { Mohammed H. Alabiech },
title = { A Multi-Population Genetic Algorithm for Secure and Efficient Elliptic Curve Parameter Generation },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2026 },
volume = { 187 },
number = { 84 },
month = { Feb },
year = { 2026 },
issn = { 0975-8887 },
pages = { 53-58 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number84/a-multi-population-genetic-algorithm-for-secure-and-efficient-elliptic-curve-parameter-generation/ },
doi = { 10.5120/ijca2026926478 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-02-21T01:28:19.454296+05:30
%A Mohammed H. Alabiech
%T A Multi-Population Genetic Algorithm for Secure and Efficient Elliptic Curve Parameter Generation
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 84
%P 53-58
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The field of cryptography has advanced rapidly in recent years, with Elliptic Curve Cryptography (ECC) emerging as one of the most efficient methods for ensuring both security and computational efficiency. The strength of this encryption technique is largely determined by the mathematical properties of the Elliptic Curves (EC), which are governed by the constants defining its structure. This study explores the use of a Genetic Algorithm (GA)—an evolutionary artificial intelligence technique—to determine optimal values for the constants of EC, aiming to maximize the number of valid points over a finite field. This approach highlights the feasibility of applying intelligent optimization techniques to complex mathematical challenges in cryptographic system design. A prototype was implemented to simulate the process and assess the GA’s performance in identifying effective solutions. Preliminary results suggest that the GA offers a viable alternative to traditional search methods, enabling more efficient exploration of cryptographic parameters. This could contribute to designing more efficient EC for cryptographic applications and deepen our theoretical and practical understanding of EC construction.

References
  1. Banerjee, A. and U. Banerjee, 2024. A High-Performance Curve25519 and Curve448 Unified Elliptic Curve Cryptography Accelerator. In Proceedings of the IEEE High Performance Extreme Computing Conference (HPEC). IEEE Boston Section.
  2. K. Vardhan, and V. Jain, 2025. Enhanced Secure File Transfer: A Comparative Analysis of Elliptic Curve Cryptography vs. RSA. In Proceedings of the International Conference on Advanced Computing Technologies (ICoACT). IEEE Madras Section, Sivakasi.
  3. S. Manickam and D. Kesavaraja, 2016. Secure Multi Server Authentication System Using Elliptic Curve Digital Signature. In Proceedings of the International Conference on Circuit, Power and Computing Technologies (ICCPCT). Nagercoil, IEEE.
  4. W. Stallings, 2011. Cryptography and Network Security Principles and Practice. Pearson, Fifth Edition.
  5. C. Pelz, 2010. Understanding Cryptography. Springer-Verlag Berlin Heidelberg.
  6. D. Hankerson and A. Menezes, 2004. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc.
  7. M. H. Alabiech, and H. M. Al-Mashhadi, "Hybrid Menezes Vanstone-ElGamal ECC Algorithm, " Iraqi Journal of Science, vol. 66, no. 3, pp. 1300-1310. 2025.
  8. H. M. Al-Mashhadi, and M. H. Alabiech, "Symmetric ECC with Variable Key using Chaotic Map, " International Journal of Computer Science Issues (IJCSI), vol. 14, no.6, pp. 24-28, 2017.
  9. R. Kumar and A. Singh, "Optimization of Elliptic Curve Parameters Using Genetic Algorithms, " Journal of Cryptographic Engineering, Springer Science + Business Media,. vol. 8, no2, pp. 121-133, 2018.
  10. L. Zhang, H. Wang, and Y. Li, "Multi-Population Genetic Algorithms for Robust Optimization, " Applied Soft Computing, Elsevier, vol. 77, pp. 430-441. 2019.
  11. D. Patel, and S. Mehta, "Comparative Study of Evolutionary Algorithms for Elliptic Curve Parameter Optimization, " Journal of Computer Mathematics, vol. 97, no. 5, pp. 1050-1064, 2020.
  12. N. Azam, T. Haider, and U. Hayat, "An Optimized Watermarking Scheme based on Genetic Algorithm and Elliptic Curve, " Swarm and Evolutionary Computation, vol. 91, no. 5, pp. 1-16, 2024.
  13. Koblitz, N., "Elliptic Curve Cryptosystems," Mathematics of computation, vol. 48, no. 177, pp. 203-209, 1987.
  14. L. Chen, D. Moody, and A. Regenscheid, 2019. Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters, National Institute of Standards and Technology, Tech. Rep.
  15. G. Jwad, 2007. Design and Implementation of Elliptic and Hyper Elliptic Curve Cryptosystems with Improved Performance, PhD Thesis, College of Engineering, University of Basrah.
  16. M. Alabbas, 2013. Textual Entailment for Modern Standard Arabic, PhD Thesis, School of Computer Science, University of Manchester: Manchester, UK.
  17. B. Meniz and F. Tiryaki, "Genetic Algorithm Optimization with Selection Operator Decider, " Arabian Journal for Science and Engineering, Springer, vol. 50, no. 10, pp. 6931–6941, 2025.
  18. S. Sivanandam and S. Deepa, 2007. Introduction to Genetic Algorithms. Springer Science & Business Media.
  19. E. Kocyigit, M. Korkmaz, O. Sahingoz, and B. Diri "Enhanced Feature Selection Using Genetic Algorithm for Machine-Learning-based Phishing URL Detection, " Applied Sciences, vol. 14, no. 14, pp. 1-21, 2024.
  20. T. Avdeenko, and K. Serdyukov, "Modified Evolutionary Test Data Generation Algorithm Based on Dynamic Change in Fitness Function Weights, " Engineering Proceedings, vol. 33, no. 23, pp. 1-9, 2023.
  21. A. Uzunoglu, C. Gahm, and A. Tuma, "Machine Learning based Algorithm Selection and Genetic Algorithms for Serial-batch Scheduling, " Computers & Operations Research, Elsevier, vol. 173, pp. 1-20, 2025.
  22. B. Miller, 1997. Noise, Sampling, and Efficient Genetic Algorithms, PhD Thesis, University of Illinois at Urbana-Champaign.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography Genetic Algorithm Base Point