Security

Elliptical Curve Cryptography (ECC)

charles-deluvio-456501-unsplash.jpg

Elliptical Curve Cryptography (ECC) is defined as a public key encryption method that can produce smaller, quicker, and more effective cryptographic keys. There are several advantages of using ECC such as the size of the key required for encryption and digital signatures are far less than with other systems. There is also less time for encryption, and none of the presently identified algorithms for the answer can be applied. The usage of brute force attacks on ECC takes an extended amount of time to be successful. 
The disadvantages of using ECC include its use of elliptic curves, generators, and finite fields, as well as points of a curve, which can lead to more complex calculations that could cause tension on a processor; this can be avoided by using lookup tables for elliptic curves, but doing so can consume precious resources on wireless devices. Also, the field has not been tested extensively compared to other fields. Next, ECC has an increased likelihood of sub-exponential attacks and successful detection of an outbreak on the system can deteriorate its protection. Finally, ECC systems are slower than RSA in public key operations in applications needing massive public key encryption. 
Reference-
Rouse, Margaret. Burr, Johnathan. “Elliptical Curve Cryptography.” Search Security. www.Searchsecurity.techtarget.com. Web. Accessed 30 May 2017.
 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s