ABSTRACT Elliptic curve cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie-Hellman Key Exchange algorithm. Encryption and decryption of texts and messages have also been attempted. In Ramasamy, Prabakar, Devi, and Suguna (2009),,the authors presented the implementation of ECC by first transforming the message into an affine point on the EC and then applying the knapsack algorithm on ECC encrypted message over the finite field GF(p). The authors in their decryption process used elliptic curve discrete logarithm to get back the plain text. This may form a computationally infeasible problem if the values are large enough in generating the plain text. In Krishna (2011), the author mapped the basin value randomly on the output of ECC to generate the cipher text. In the present work the output of ECC algorithm is iterated by the values which are randomly picked from the basin values to provide a probabilistic approach to the output which makes the algorithm free from the chosen cipher text attack. Thus by having key lengths of even much less than 160 bits, the present algorithm provides sufficient strength against crypto analysis and whose performance can be compared with standard algorithms such as RSA.