Steps for ECC

Step 1: The sender and receiver selects two integers as private keys.

Step 2: The public keys of both sender and receiver are generated by multiplying the base point of the elliptic curve with the corresponding private keys.

Public key of sender:;

Public key of receiver:.

Step 3: The security key is generated as follows:

Secret Key of sender:;

Secret Key of receiver:.

Step 4: The signature is generated using the hash functions.

Step 5: The signature is sent to the receiver for authentication.

Step 6: At the encryption phase, the message is converted into cipher text using the public keys and a point on the curve.

Step 7: The cipher text is decrypted at the receiver end using the private key.

Step 8: The signature is validated, if the sender’s public key is encoded in it.