Another uncertainty about elliptic curve cryptography is related to patents. There are more than 130 patents covering specific elliptic curve applications owned by BlackBerry (through the acquisition of Certicom in 2009). Many of these patents have been allowed to be used by private organizations and even by the NSA. This has led some developers to question whether their ECC implementations violate this patent portfolio. In 2007, Certicom filed a complaint against Sony for certain uses of elliptic curves, but this complaint was dismissed in 2009. There are now many implementations of elliptic curve cryptography, which are believed to not infringe these patents and are widely spread. We can call this billiard movement on two points „point“. Two points on a curve can be marked together to get a new point. We use RSA because CloudFlare`s SSL certificate is bound to an RSA key pair. Modern browsers also support certificates based on elliptic curves. If CloudFlare`s SSL certificate were an elliptic curve certificate, this part of the page would show ECDHE_ECDSA.
The proof of the identity of the server would be done with ECDSA, the Elliptic Curve Digital Signature Algorithm. We have shown that elliptic curves need less computing power, memory, and communication bandwidth, which gives them a clear advantage over traditional crypto-algorithms. To date, elliptic curve cryptography is widely accepted, especially in wireless and portable devices, compared to traditional crypto-systems (DES, RSA, AES, etc.) that tend to be hungry for electricity. While ECC`s performance benefits are impressive, the data security industry needs to ensure that the elliptic curve algorithm security system has been thoroughly reviewed in the public forum and has also been specified by important standards around the world. But we believe that the ellipse cryptographic curve is here today and that it is undoubtedly the next generation of public key cryptography of choice. Elliptic-curve Diffie-Hellman (ECDH) is a key protocol that allows two parties, each with a public-private key pair with an elliptic curve, to create a common secret on an uncertain channel.    This common secret can be used directly as a key or to deduce another key. The derived key or key can then be used to encrypt subsequent communications with a symmetric key….