This document summarizes elliptic curve cryptography and proposes a method to enhance its security. It begins with an abstract that discusses how ECC is more secure than other public key cryptosystems and proposes enhancing ECC security using character conversion. It then provides background on encryption methods and key types, describing symmetric, asymmetric, and public key encryption. It explains how ECC works by defining a finite group where exponentiation is easy but solving the discrete logarithm problem is very difficult, making ECC secure even with smaller key sizes than other methods. Finally, it proposes enhancing ECC security against attacks by using a character conversion method.