29 Aug 2022

243

Definition and usage of Elliptic Curve Cryptography

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 282

Pages: 1

Downloads: 0

Data encryption technologies continue to advance as hackers find more sophisticated ways to access systems, programs, and communication. The Elliptic Curve Cryptography (ECC) is a data encryption algorithm that generates key pairs for public and private keys when encrypting and decrypting communication and network traffic (Singh & Singh, 2015). This algorithm applies calculations used in elliptic curves. On most occasions, ECC is associated with the Rivest–Shamir–Adleman (RSA) encryption algorithm. However, unlike RSA, ECC uses a smaller key size. In cryptography, the trapdoor function plays a significant role in security data, making the whole process foolproof. In essence, a trapdoor function entails a function that is easily computed in one direction but becomes difficult when trying to compute using the opposite direction (Singh & Singh, 2015). For instance, the function a + b = c can be computed in both directions if the values of two variables are known. As such, the function would not be classified as a trapdoor function.

In recent times, ECC has grown in popularity based on its smaller key size. While uses prime numbers to generate public and private keys, ECC employs an algebraic structure of a curved ellipse. The algorithm uses the function y 2 = x 3 + ax + b to determine the shape of the curve given values of a and b (Singh & Singh, 2015). The key size is crucial in determining how secure the encryption is as it also determines the size of the curve. A person accessing an ECC encrypted information would find it difficult without a private key. This is because recreating the function or guessing the number of times the curve was intersected is near impossible (Singh & Singh, 2015). Even with today's high computing power, solving an elliptic algorithm is more challenging than the factoring method used by RSA and other encryption mechanisms. ECC promises to provide better security and encryption features compared to the current algorithms at a smaller footprint.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Reference 

Singh, L. D., & Singh, K. M. (2015). Implementation of text encryption using elliptic curve cryptography.  Procedia Computer Science 54 , 73-82.  https://doi.org/10.1016/j.procs.2015.06.009 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Definition and usage of Elliptic Curve Cryptography.
https://studybounty.com/definition-and-usage-of-elliptic-curve-cryptography-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration