Member-only story

Elliptic Curve Cryptography Basics | Cryptography & Blockchain

Simple Explanation of ECC — Elliptic Curve Cryptography | Blockchain | Karthikeyan Nagaraj

Karthikeyan Nagaraj
InfoSec Write-ups
6 min readJan 23, 2023

--

Introduction:

  • A popular implementation of the public key, and the private key is the Rivest Shamir Adleman (RSA) algorithm.
  • The common application of RSA is passwordless user authentication, for example for accessing a virtual machine on Amazon cloud.
  • Though RSA is very commonly used in many applications, blockchains need a more efficient and stronger algorithm.
  • Efficiency is a critical requirement since the public key pair is frequently used in many different operations in blockchain protocol.

Elliptic Curve Cryptography, the ECC family of algorithms is used in the bitcoin as well as an Ethereum blockchain for generating the key pair.

Why ECC, not RSA?

  • ECC is stronger than RSA for a given number of bits.
  • 256-bit ECC key pair is equal in strength to about 3072 bits of RSA key pair.
  • Both bitcoin and Ethereum use ECC-based algorithms for their encryption needs

What is Cryptography?

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Karthikeyan Nagaraj

Entrepreneur | Writer | Cyber Security Consultant | AI Researcher

No responses yet

What are your thoughts?