Banner photo, downloaded from Pixabay

Elliptic Curve Cryptography (ECC)

Asymmetric (or public key) cryptography is based on two types of keys: private keys and public keys. These keys are related so that the public keys can be computed from the private keys, but deriving the private keys from the public keys is infeasible. The main use cases of asymmetric cryptography in contemporary secure communication protocols are key exchange and digital signatures. The former allows two parties to securely derive a shared secret key (for example, for AES) over an insecure channel (for example, the Internet). The latter allows signing messages with a private key so that anyone can later verify the signature with the public key.

Probably the most famous asymmetric cryptographic algorithm is the RSA (Rivest-Shamir-Adleman), but the current state-of-the-art of asymmetric cryptography is based on elliptic curve mathematics, which are complicated mathematical algorithms combining security with efficient computations and small key sizes. Commonly used elliptic curve algorithms include the NIST curves by the U.S. NIST and the newer Curve25519.


The following IP cores implement elliptic curve cryptography on Curve25519, please click on the Product Code or PDF icon to download a Product Brief of the IP core.

  • XIP4001C: Curve25519 Key Exchange (X25519), compact version:
  • XIP4003C: Compact Curve25519 Key Exchange and Digital Signatures, please contact for Product Brief
The IP cores comply with RFC 7748 and RFC 8032.