Define Curve
Operations
Visualization
Smooth curve plot over real numbers
Point Addition (ℝ)
Geometric chord/tangent visualization
Visualization
Click on the curve to set P or Q
Scalar Multiplication (ℝ)
Follow k × P along the curve
Visualization
Visualization
Define Curve
Operations
Points
Point Addition
Add two points: P + Q = R
Visualization
Points on the elliptic curve (mod p)
Scalar Multiplication
Multiply a point by a scalar: k × P
Visualization
Visualization
Diffie-Hellman Key Exchange
Watch how Alice and Bob establish a shared secret over a public channel using elliptic curve cryptography
Interactive Visualization
Follow along as the key exchange happens step by step
Step-by-Step Breakdown
Elliptic Curve Discrete Logarithm Problem
This interactive demo shows why elliptic curve cryptography is secure.
Computing Q = k×G is easy, but finding k from Q is hard!
Setup Elliptic Curve
Choose curve parameters and find a base point G
Compute Public Key
Pick a secret k and compute Q = k × G
🔑 What's happening: In real crypto, k is your private key (kept secret) and Q is your public key (shared with others). Computing Q from k is easy and fast.
Attack: Find the Private Key
Try to recover k by testing all possibilities
⚠️ The Challenge: Given only G and Q, an attacker must try k' = 1, 2, 3... until they find k' where k'×G = Q. This is the hard problem that makes ECC secure!
Attack Progress
Watch the algorithm test each value of k' in real-time as it tries to crack the key
No Attack in Progress
Complete Steps 1 & 2, then launch the brute-force attack to see attempts here.
Setup Encryption
Operations
Key Information
Encrypt Message
Secure your messages using elliptic curve cryptography
Click to browse or drag & drop
Any file type • Max size recommended: 10MB
Encryption Visualization
Watch the encryption process step by step
Decrypt Message
Reveal encrypted messages using your private key
Click to browse or drag & drop
Supports JSON and ciphertext files
Decryption Visualization
Watch the decryption process step by step