login
Home / Papers / Elliptic Curve Cryptography for Network Security

Elliptic Curve Cryptography for Network Security

4 Citations•2023•
Gorantla Naga Manoj Chowdary, Medapati Phani Sri Rama lakshmi, Yarababugari Nylu
2023 International Conference on Inventive Computation Technologies (ICICT)

In this article, the function of ECC in network security is explained, and how ECC uses smaller keys for enhanced security and quick processing.

Abstract

This research study discusses about the concept of elliptic curve cryptography (ECC), and how it offers a faster and more secure technique of encryption in compared to the existing standards in the RSA public-key cryptographic methods. All pertinent asymmetric cryptographic primitives, such as digital signatures and key agreement procedures, are covered by elliptic curve cryptography. The primary operation of ECCs, scalar multiplication (k.P), is the function employed for this purpose. P is a point on an elliptic curve, and k is an integer. In this article, the function of ECC in network security is explained. ECC uses smaller keys for enhanced security and quick processing.