This document discusses the security of the Elliptic Curve Cryptography algorithm, its vulnerabilities, and its comparison with RSA algorithm. It also talks about the challenges related to interoperability and infrastructure requirements when switching from one cryptosystem to another. The document cites various references to support the discussion.