0% found this document useful (0 votes)
169 views12 pages

Elliptic Curve Cryptography

Elliptic curve cryptography (ECC) is a public key encryption technique that can create faster, smaller, and more efficient cryptographic keys. ECC generates keys through properties of elliptic curve equations rather than large prime numbers. ECC requires significantly smaller key sizes than traditional methods for the same level of security, offering benefits like faster computations and less storage space. ECC is ideal for constrained environments like phones and smart cards.

Uploaded by

joelanandraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
169 views12 pages

Elliptic Curve Cryptography

Elliptic curve cryptography (ECC) is a public key encryption technique that can create faster, smaller, and more efficient cryptographic keys. ECC generates keys through properties of elliptic curve equations rather than large prime numbers. ECC requires significantly smaller key sizes than traditional methods for the same level of security, offering benefits like faster computations and less storage space. ECC is ideal for constrained environments like phones and smart cards.

Uploaded by

joelanandraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Elliptic Curve Cryptography

Elliptic Curve Cryptography

Elliptical curve cryptography (ECC) is a


public key encryption technique based on
elliptic curve theory that can be used to
create faster, smaller, and more efficient
cryptographic keys.

2
Elliptic Curve
Cryptography
ECC generates keys through the properties
of the elliptic curve equation instead of the
traditional method of generation as the
product of very large prime numbers

3
Elliptic Curve Cryptography

 ECC requires significantly smaller key size


with same level of security.
 Benefits of having smaller key sizes :
faster computations, need less storage
space.
 ECC ideal for constrained environments :
Pagers ; PDAs ; Cellular Phones ; Smart
Cards.

4
elliptic curve
Elliptic curves are not ellipses. They are so
named because they are described by
cubic equations, used for calculating the
circumference of an ellipse.
An elliptic curve is a set of points (x, y), for
which it is true that
y2 = x3 + ax + b given certain chosen
numbers a and b.

5
elliptic curve

6
Elliptic Curves over Zp

7
ECC Diffie-Hellman Key Exchange

8
ECC Diffie-Hellman Key
Exchange

9
ECC Diffie-Hellman Key
Exchange

10
ECC Diffie-Hellman Key
Exchange

11
Thank You…

You might also like