The use of elliptic curves in information security