-
Notifications
You must be signed in to change notification settings - Fork 19.9k
[FEATURE REQUEST] <title> Add Elliptic Curve Cryptography (ECC) Algorithm #5525
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I would like to work on this |
@ShreeHarish Great.. But I already have the code ready with me I am just waiting for approval to work on it. |
My bad, I searched for pull requests regarding this issue number and couldnt find any. Hence I started working on it. |
No worries, there a lot of other issues you can work on. I hope you find yours , good luck. |
Sounds great, let's add it! |
@siriak please assign this issue to me. |
Please add hacktoberfest and hacktoberfest-accepted labels to this issue now and PR after I am done with merging it. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contribution! |
Please reopen this issue once you have made the required changes. If you need help, feel free to ask in our Discord server or ping one of the maintainers here. Thank you for your contribution! |
What would you like to Propose?
I would like to propose adding an implementation of the Elliptic Curve Cryptography (ECC) algorithm to the ciphers section of the repository. Elliptic Curve Cryptography (ECC) is a widely-used public-key encryption technique that provides strong security with smaller key sizes compared to RSA. It is essential in modern cryptographic protocols, including SSL/TLS, blockchain (Bitcoin, Ethereum), and digital signatures (ECDSA). The implementation will include point addition, scalar multiplication, key generation, encryption, decryption, and ECDSA.
Issue details
The repository currently lacks an implementation of Elliptic Curve Cryptography (ECC). My implementation includes:
Elliptic Curve Operations: Point addition and scalar multiplication, which are essential for ECC's cryptographic functions.
Key Generation: Generating public and private keys using elliptic curve cryptographic methods.
Encryption and Decryption: Encrypting data using a recipient's public key and decrypting it with the corresponding private key.
Elliptic Curve Digital Signature Algorithm (ECDSA): Implementing the signing and verification of digital signatures, a practical use of ECC in real-world applications.
Additional Information
ECC provides strong security with smaller key sizes compared to traditional algorithms like RSA, making it ideal for resource-constrained devices and modern cryptographic protocols.
The text was updated successfully, but these errors were encountered: