- Trending Categories
- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP

- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who

Elliptic curve cryptography is used to implement public key cryptography. It was discovered by Victor Miller of IBM and Neil Koblitz of the University of Washington in the year 1985. ECC popularly used an acronym for Elliptic Curve Cryptography. It is based on the latest mathematics and delivers a relatively more secure foundation than the first generation public key cryptography systems for example RSA.

In 1985, cryptographic algorithms were proposed based on elliptic curves. An elliptic curve is the set of points that satisfy a specific mathematical equation. They are symmetrical.

Websites make extensive use of ECC to secure customers’ hypertext transfer protocol connections.

It is used for encryption by combining the key agreement with a symmetric encryption scheme.

It is also used in several integer factorization algorithms like Lenstra elliptic-curve factorization.

Time stamping uses an encryption model called a blind signature scheme. It is possible using Elliptic Curve Cryptography.

- Related Questions & Answers
- What is Quantum Cryptography and how is it better than Classical Cryptography
- What is Cryptography in Computer Network?
- What is Cryptography in information security?
- What is Cryptography? (Definition, Process, and Types)
- What is Polar Curve in Illumination?
- What is the difference between Encryption and Cryptography?
- What is Public key cryptography in information security?
- What is Asymmetric Key Cryptography in information security?
- What is the difference between Cryptography and Cyber Security?
- What is the purpose of Cryptography in Information Security?
- What Is an Isoquant Curve and How Does It Work?
- What is the difference between Symmetric Key Cryptographic and Asymmetric Key Cryptography?
- Yield Curve and Inverted Yield Curve
- What are cryptography, symmetric and public key algorithms?
- What are the functions of Public key Cryptography?

Advertisements