A Review on Elliptic Curve Cryptography

  • Maiya Al Saadi, Basant Kumar


Cryptography has many algorithms that are used to secure the communication and make the data exchange between the sender and receiver safe and protected from the attackers. The proposed algorithm will play a vital role to address limitations in Elliptic Curve Cryptography to tackle all issues pertaining to exchange keys. This paper also illustrates a review of ECC encompassed with ECC Algorithm Process, Basic Protocols of ECC Algorithm, Various ECC Implementation and ECC Application. This paper also signifies various graphical representations of cryptographic process on EC over infinite and finite field.