There are two common types of cypher systems that are used, the first is called the conventional or symmetric method. This is when an interceptor can determine the decryption key from the encryption key. The keys are usually identical in this case. They are known as one-key systems. The other type of cypher systems is called the public key or asymmetric method. Oppositely, it is when the …show more content…
There has been a great deal of research on elliptic curve cryptography. Even though it has already been invented, it is considered the future since it is not yet fully understood. It essentially used the same algorithm as the RSA Encryption but instead of using prime numbers, it uses numbers that are chosen from a finite field within an elliptic curve expression. This allows the keys to be small but still very robust in terms of security. Likewise, it means that the time of encryption and decryption with the key will be reduced allowing more secure data to be passed with the same, high amount of