Elliptic Curve Cryptography (ECC) with SHA-512: An elliptic curve is given by an equation in the form of The finite fields those are commonly used over primes (FP) and binary field (F2n). The security of ECC is based on the elliptic curve discrete logarithm problem (ECDCP). This problem is defined as: Given point X, Y on elliptic curve, find z such that X=zY. The following steps describe how ECC works with SHA-512 [9], [10]. ECC key generation: To generate a public and private key pair for use in ECC communication the