Elliptic curve Cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focus on generation of elliptic curve and shows why finite fields are introduced. But for accurate observation we do analysis on category of cryptographic primitives used to solve given security problem. RSA & ECDSA both have basic criteria of production of keys and method of encryption and decryption in basic application as per security and other properties which are authentication, non-repudiation, privacy, integrity.
KAUR, AMANPREET and GOYAL, VIKAS
"A COMPARATIVE ANALYSIS OF ECDSA V/S RSA ALGORITHM,"
International Journal of Computer Science and Informatics: Vol. 4:
1, Article 2.
Available at: https://www.interscience.in/ijcsi/vol4/iss1/2