Steps for ECC |
Step 1: The sender and receiver selects two integers |
Step 2: The public keys of both sender and receiver are generated by multiplying the base point |
Public key of sender: |
Public key of receiver: |
Step 3: The security key is generated as follows: |
Secret Key of sender: |
Secret Key of receiver: |
Step 4: The signature is generated using the hash functions. |
Step 5: The signature is sent to the receiver for authentication. |
Step 6: At the encryption phase, the message is converted into cipher text using the public keys and a point on the curve. |
Step 7: The cipher text is decrypted at the receiver end using the private key. |
Step 8: The signature is validated, if the sender’s public key is encoded in it. |