## Implementing ElGamal Elliptic Curve Cryptography

Steps of implementing ElGamal ECC:

- Generating elliptic curve and choosing random base point (
- Generating private and public key for the receiver ( A computes and send it to B. B computes )
- Generating message and a random point ( message point = , A then choose a random bit pattern )
- Embed the message onto the curve and send the result with the random point ( A computes two points: and
- Decrypt the ciphertext and make sure the data sent and received are the same ( B computes and substracts this from to get )

## Bobby Prabowo 12:42 pm

onMay 12, 2010 Permalink |kok eneg yah liatnya. wkwkwkw

## CG 2:00 pm

onMay 12, 2010 Permalink |keknya lebih eneg yang ngetik π

## Tafta 4:01 pm

onOctober 4, 2011 Permalink |i expected more when i click this link from google (kabooooor……..)

## CG 6:35 pm

onOctober 4, 2011 Permalink |tft: eh kalem, yang udah advanced mah ga diposting disini, nanti disertasi gue dicuri orang π