### Unit 6: Elliptic Curve Cryptography

This unit will cover elliptic curve cryptography. This approach to public-key cryptography is based on the algebraic structure of elliptic curves over finite fields. This unit includes examples of elliptic curves over the field of real numbers. The next unit will explain the Diffie-Hellman key exchange as the most important example of cryptographic protocol for symmetric key exchange. In the last part of this unit, we will learn about the elliptic curve discrete logarithm problem, which is the cornerstone of much of present-day elliptic curve cryptography.

**Completing this unit should take you approximately 12 hours.**

### 6.1: Elliptic Curve Cryptography

Read this article.

### 6.2: Elliptic Curves

Read this article to learn about elliptic curves. Make sure you understand the examples given. Depending on your mathematics background, you may need to click on the additional links explaining the terminology used.

### 6.2.1: Diffie-Hellman Key Exchange

Read this page to learn how to exchange the keys with Diffie-Hellman key exchange technique.

### 6.2.2: Elliptic Curve Discrete Logarithm Problem

Read this page, which introduces elliptic curve discrete logarithm problems. Make sure you know what the problems ask you to solve.