APPLICATION OF ELLIPTICAL CURVES IN INFORMATION PROTECTION