0% found this document useful (0 votes)
4 views

ECC Simple Explanation

Elliptic Curve Cryptography (ECC) is a method for securing data using mathematical curves defined by the formula y² = x³ + ax + b. It involves operations on points on the curve to generate public and private keys, where the public key is derived from a known point added to itself multiple times. ECC offers strong security with smaller and faster keys compared to traditional methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

ECC Simple Explanation

Elliptic Curve Cryptography (ECC) is a method for securing data using mathematical curves defined by the formula y² = x³ + ax + b. It involves operations on points on the curve to generate public and private keys, where the public key is derived from a known point added to itself multiple times. ECC offers strong security with smaller and faster keys compared to traditional methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

What is ECC?

• A method to keep data safe.


• Uses special math with curves.
• Works with points on a curve instead of huge
numbers.
What is an Elliptic Curve?
• Formula: y² = x³ + ax + b
• It’s a smooth, loop-like curve.
• Defined by two numbers (a and b).
Points on the Curve
• Points are (x, y) pairs that lie on the curve.
• Example points: P, Q.
• We use these points to do cryptographic
operations.
Adding Two Points (P + Q)
• Draw a straight line between P and Q.
• The line crosses the curve at a third point, R'.
• Reflect R' across the x-axis to get the result: R
= P + Q.
Doubling a Point (P + P)
• Draw a tangent line at P.
• The line crosses the curve at another point, R'.
• Reflect R' across the x-axis to get 2P.
Why Do This?
• To create public and private keys.
• Easy to compute in one direction.
• Very hard to reverse (safe and secure).
Example
• Start with point G (known to everyone).
• Choose a secret number, d (private key).
• Public key = G added to itself d times.
Summary
• Elliptic Curve: A smooth, loop-shaped curve
• Point: A location (x, y) on the curve
• Private Key: A secret random number
• Public Key: A visible point made by adding G
many times
• Adding Points: Draw line, find 3rd point,
reflect it
• Why ECC?: Strong security with small, fast
keys

You might also like