SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Enhancing Security in
Cloud Storage using
ECC Algorithm
Shivam Singh
M.Tech Cyber Security
Threats to Data Stored on Cloud
 Increasing the risk of unauthorized physical access to the data.
 Data security and privacy.
 Increases the number of networks over which the data travels.
 Sharing of storage and networks with many other users/customers leads to insecurity of
data.
How To Secure Data?
 Encryption
 Authentication Processes
 Authorization Practices
Rivest-Shamir-Adleman (RSA)
 It is the most widely used public key cryptography algorithm for encryption
and decryption.
 It can be used to encrypt a message without the need to exchange a secret key
separately.
 The RSA algorithm can be used for both public key encryption and digital
signatures.
RSA Algorithm
Key Generation:
1. Choose two different large random prime numbers p and q.
2. Calculate n=pq
• n is the modulus for the public key and the private keys
3. Calculate the totient: ϕ(n) = (p-1)(q-1)
4. Choose an integer e such that 1<e< ϕ(n), and e is coprime to ϕ(n) i.e.: e and ϕ(n) share no factors
other than 1; gcd(e, ϕ(n))=1
• e is the released as the public key exponent
5. Compute d to satisfy the congruence relation
de≡1 (mod ϕ(n))) i.e.: de=1 + k ϕ(n) for some integer k
• d is kept as the private key exponent
Encryption:
INPUT: RSA public key (n, e), plaintext m ∈ [0, n−1].
OUTPUT: Ciphertext c.
1. Compute c = me(mod n)
2. Return (c).
Decryption:
INPUT: Public key (n, e), private key d, cipher text c.
OUTPUT: Plaintext m.
1. Compute m = cd(mod n)
2. Return (m).
Elliptic Curve Cryptography (ECC)
 Elliptical curve cryptography (ECC) is a public key encryption technique based
on elliptic curve theory that can be used to create faster, smaller, and more
efficient cryptographic keys.
 ECC generates keys through the properties of the elliptic curve equation
instead of the traditional method of generation as the product of very large
prime numbers.
 Because ECC helps to establish equivalent security with lower computing
power and battery resource usage, it is becoming widely used for mobile
applications.
ECC Algorithm
Key Generation
 Select a number, d within the range of n. Generate the public key using the
following equation,
Q = d * P
• d = random number selected within the range of (1 to n-1).
• P = point on the curve,
• Q = public key and d is the private key.
Encryption
 Let ‘m’ be the message that has to be sent. Consider ‘m’ has the point ‘M’ on
the curve ‘E’. Randomly select ‘k’ from [1 - (n-1)]. Two cipher texts will be
generated let it be C1 and C2.
C1 = k * P and C2 = M + (k * P)
Decryption
 Use the following equation to get back the original message ‘m’ that was sent.
 M = C2 - d * C1
• M = original message that was sent.
Result
ECC algorithm is used in case of key exchanges by certificate authority (CA) to share the
public key certificates with end users. Elliptic Curve Cryptography is a secure and more
efficient encryption algorithm than RSA as it uses smaller key sizes for same level of
security as compared to RSA.
Advantages of ECC over RSA:
1. Shorter keys are as strong as long key for RSA.
2. Low on CPU consumption.
3. Low on memory usage.
4. Size of encrypted data is smaller.
spu15cs21@policeuniversity.ac.in

Weitere ähnliche Inhalte

Was ist angesagt?

Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
Editor Jacotech
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
Varun Janga
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 

Was ist angesagt? (20)

Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice Cryptography
 
Rsa
RsaRsa
Rsa
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Ch9
Ch9Ch9
Ch9
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Homomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain PrinciplesHomomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain Principles
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 

Andere mochten auch

Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Kelly Bresnahan
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
Spinal cord injury presentation
Spinal cord injury presentationSpinal cord injury presentation
Spinal cord injury presentation
sshssomsen
 

Andere mochten auch (20)

Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Final report
Final reportFinal report
Final report
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Approach to bradycardia
Approach to bradycardiaApproach to bradycardia
Approach to bradycardia
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Bradycardia
BradycardiaBradycardia
Bradycardia
 
Imaging In Trauma
Imaging In TraumaImaging In Trauma
Imaging In Trauma
 
Basic life support
Basic life supportBasic life support
Basic life support
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Spinal Trauma (Spinal Cord Injury)
Spinal Trauma (Spinal Cord Injury)Spinal Trauma (Spinal Cord Injury)
Spinal Trauma (Spinal Cord Injury)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
spinal cord injury
 spinal cord injury spinal cord injury
spinal cord injury
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
management of spinal cord injury
management of spinal cord injurymanagement of spinal cord injury
management of spinal cord injury
 
Spinal cord injury presentation
Spinal cord injury presentationSpinal cord injury presentation
Spinal cord injury presentation
 
Spinal cord injury (sci) Rehab
Spinal cord injury (sci) RehabSpinal cord injury (sci) Rehab
Spinal cord injury (sci) Rehab
 
Spinal cord injury
Spinal cord injurySpinal cord injury
Spinal cord injury
 
Spinal Cord Injury
Spinal Cord InjurySpinal Cord Injury
Spinal Cord Injury
 

Ähnlich wie Enhancing security in cloud storage

Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 

Ähnlich wie Enhancing security in cloud storage (20)

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
F010243136
F010243136F010243136
F010243136
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 

Mehr von Shivam Singh (8)

Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Virtualization
VirtualizationVirtualization
Virtualization
 
The problems of syrian refugees and european union
The problems of syrian refugees and european unionThe problems of syrian refugees and european union
The problems of syrian refugees and european union
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
Democracy is mobocracy in india
Democracy is mobocracy in indiaDemocracy is mobocracy in india
Democracy is mobocracy in india
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Url manipulation
Url manipulationUrl manipulation
Url manipulation
 
Threads
ThreadsThreads
Threads
 

Kürzlich hochgeladen

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Enhancing security in cloud storage

  • 1. Enhancing Security in Cloud Storage using ECC Algorithm Shivam Singh M.Tech Cyber Security
  • 2. Threats to Data Stored on Cloud  Increasing the risk of unauthorized physical access to the data.  Data security and privacy.  Increases the number of networks over which the data travels.  Sharing of storage and networks with many other users/customers leads to insecurity of data.
  • 3. How To Secure Data?  Encryption  Authentication Processes  Authorization Practices
  • 4. Rivest-Shamir-Adleman (RSA)  It is the most widely used public key cryptography algorithm for encryption and decryption.  It can be used to encrypt a message without the need to exchange a secret key separately.  The RSA algorithm can be used for both public key encryption and digital signatures.
  • 5. RSA Algorithm Key Generation: 1. Choose two different large random prime numbers p and q. 2. Calculate n=pq • n is the modulus for the public key and the private keys 3. Calculate the totient: ϕ(n) = (p-1)(q-1) 4. Choose an integer e such that 1<e< ϕ(n), and e is coprime to ϕ(n) i.e.: e and ϕ(n) share no factors other than 1; gcd(e, ϕ(n))=1 • e is the released as the public key exponent 5. Compute d to satisfy the congruence relation de≡1 (mod ϕ(n))) i.e.: de=1 + k ϕ(n) for some integer k • d is kept as the private key exponent
  • 6. Encryption: INPUT: RSA public key (n, e), plaintext m ∈ [0, n−1]. OUTPUT: Ciphertext c. 1. Compute c = me(mod n) 2. Return (c). Decryption: INPUT: Public key (n, e), private key d, cipher text c. OUTPUT: Plaintext m. 1. Compute m = cd(mod n) 2. Return (m).
  • 7. Elliptic Curve Cryptography (ECC)  Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.  ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers.  Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications.
  • 8. ECC Algorithm Key Generation  Select a number, d within the range of n. Generate the public key using the following equation, Q = d * P • d = random number selected within the range of (1 to n-1). • P = point on the curve, • Q = public key and d is the private key.
  • 9. Encryption  Let ‘m’ be the message that has to be sent. Consider ‘m’ has the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from [1 - (n-1)]. Two cipher texts will be generated let it be C1 and C2. C1 = k * P and C2 = M + (k * P) Decryption  Use the following equation to get back the original message ‘m’ that was sent.  M = C2 - d * C1 • M = original message that was sent.
  • 10. Result ECC algorithm is used in case of key exchanges by certificate authority (CA) to share the public key certificates with end users. Elliptic Curve Cryptography is a secure and more efficient encryption algorithm than RSA as it uses smaller key sizes for same level of security as compared to RSA. Advantages of ECC over RSA: 1. Shorter keys are as strong as long key for RSA. 2. Low on CPU consumption. 3. Low on memory usage. 4. Size of encrypted data is smaller.