SlideShare a Scribd company logo
DIFFERENCE BETWEEN
ECC AND RSA IN PUBLIC KEY ENCRYPTION
ALGORITHMS.
TRIPTI GOYAL
RSA stands for Rivest Shamir Adleman, and these are the names of the
inventors of this cryptographic algorithm.
Though it came into existence in 1977, in today’s time, RSA is widely used
for encrypting emails, software, website data, etc.
Its principle is based on the prime factorization method for one-way data
encryption. The process involved taking two large random prime numbers and
multiplying them together to develop a public key.
It is known as the modulus, and though it is made public, one cannot
determine what the message or piece of data was as the two prime numbers
are kept private.
WHAT IS RSA?
WHAT IS ECC?
Definition:
 ECC stands for Elliptic Curve Cryptography.
 It's an asymmetric cryptographic algorithm based on the algebraic structure of elliptic curves
over finite fields.
 Proposed by Neal Koblitz and Victor S in the 1980s.
 Gained prominence in 2004.
 Known for its resilience against attacks due to the difficulty of solving the mathematical
problem presented by the elliptic curve.
Security Measures:
 Tough to crack due to the mathematical complexity of ECDLP.
 No known solution to the elliptical curve mathematical problem.
 Potential attacks involve brute-force or trial-and-error approaches.
Comparative Strength:
 ECC provides strong security with smaller key sizes compared to traditional cryptographic
algorithms.
KEY LENGTH: ECC 256 VS RSA 2048
Security (in Bits) Key Length of RSA Key Length of ECC
80 1024 160-223
112 2048 224-255
128 3072 256-383
192 7680 384-511
The key length of RSA is measured in bits, and it typically ranges from 1024 to 4096 bits.
The longer the key length, the stronger the encryption. For RSA, a key length of 2048 bits is considered the
standard that is secure enough for most applications.
When compared to RSA, ECC has a smaller key length compared to RSA.
It is measured in terms of the size of the prime modulus, which typically ranges from 160 to 521 bits.
For ECC, A key length of 256 bits is considered to be the standard.
THE PERFORMANCE OF ECC AND RSA
 Encryption/Decryption: ECC encryption and decryption operations are faster
than RSA due to the use of elliptic curve mathematics.
 Digital Signatures: Due to the application of elliptic curve mathematics,
ECC digital signatures are faster than RSA
 Bandwidth: The demand for bandwidth is less with ECC compared to RSA when
transmitting data over a network.
 Power Consumption: ECC drains less power than RSA, so it is more suitable
for devices with limited power resources.
If we have to give you a number- RSA is capable of responding to 450
requests per second with a 150-millisecond average response time,
but ECC takes only 75 milliseconds to respond to the same number of
requests per second.
KEY GENERATION
ECC key generation is faster and more computationally efficient
compared to RSA key generation.
This is because ECC key generation involves choosing a random
elliptic curve over a finite field and selecting a random point
as the public key.
On the other hand, RSA key generation involves the selection of
two large prime numbers and performing mathematical operations on
them to generate the public and private keys.
APPLICATIONS
ECC is used in various protocols, including SSL/TLS, SSH, and
IPSec, whereas RSA is mainly used in SSL/TLS and SSH.
Rivest-Shamir-Adleman (RSA) Elliptic Curve Cryptography (ECC)
RSA is one of the oldest and well-established public-key
cryptography methods.
ECC is comparatively a newer public-key cryptography
method.
Works on the principle of the prime factorization
method.
Works on the mathematical representation of elliptic
curves.
RSA runs faster as it is a simple algorithm. As it is complex in nature, ECC takes more time to run.
Due to a lack of scalability, RSA has started becoming
vulnerable.
ECC is more secure thanks to its adaptive phase. Its
application might scale up in the future.
For implementing encryption, RSA demands bigger key
lengths.
Compared to RSA, ECC demands shorter key lengths.
Standard Key length- 2,048 bits Standard Key length- 256 bits
It supports all the platforms.
It exhibits compatibility with new browsers and OS
(some platforms like cPanel are not supported)
IS ECC THE BEST FOR YOU?
Elliptic curve cryptography is used in various organizations
today, such as Facebook, Cloudflare, etc. So, is it ideal for
you?
As per the current scenario, RSA is the most widely used
cryptosystem. It is used by over 90% of SSL certificates, while
ECC is used by 4%. Now, by statistics, it may seem like it is not
for you. But, trust us, the adoption of ECC is on the rise.
If you have a website that requires powerful security and is
complex, ECC could be the perfect match for you. However, note
that the use of ECC requires implementation, and it needs to be
handled carefully.
THANK YOU !!
THANK YOU !!
THANK YOU !!

More Related Content

Similar to Difference between ECC and RSA PublicKey

RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
guestff64339
 
50620130101002
5062013010100250620130101002
50620130101002
IAEME Publication
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
 
SSLtalk
SSLtalkSSLtalk
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
IRJET Journal
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
IJECEIAES
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
 
Project Proposal Presentation
Project Proposal PresentationProject Proposal Presentation
Project Proposal Presentation
guest1a53eae
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
ncct
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
Nisheed KM
 

Similar to Difference between ECC and RSA PublicKey (20)

RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
50620130101002
5062013010100250620130101002
50620130101002
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Project Proposal Presentation
Project Proposal PresentationProject Proposal Presentation
Project Proposal Presentation
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
 

Recently uploaded

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Difference between ECC and RSA PublicKey

  • 1. DIFFERENCE BETWEEN ECC AND RSA IN PUBLIC KEY ENCRYPTION ALGORITHMS. TRIPTI GOYAL
  • 2. RSA stands for Rivest Shamir Adleman, and these are the names of the inventors of this cryptographic algorithm. Though it came into existence in 1977, in today’s time, RSA is widely used for encrypting emails, software, website data, etc. Its principle is based on the prime factorization method for one-way data encryption. The process involved taking two large random prime numbers and multiplying them together to develop a public key. It is known as the modulus, and though it is made public, one cannot determine what the message or piece of data was as the two prime numbers are kept private. WHAT IS RSA?
  • 3. WHAT IS ECC? Definition:  ECC stands for Elliptic Curve Cryptography.  It's an asymmetric cryptographic algorithm based on the algebraic structure of elliptic curves over finite fields.  Proposed by Neal Koblitz and Victor S in the 1980s.  Gained prominence in 2004.  Known for its resilience against attacks due to the difficulty of solving the mathematical problem presented by the elliptic curve. Security Measures:  Tough to crack due to the mathematical complexity of ECDLP.  No known solution to the elliptical curve mathematical problem.  Potential attacks involve brute-force or trial-and-error approaches. Comparative Strength:  ECC provides strong security with smaller key sizes compared to traditional cryptographic algorithms.
  • 4. KEY LENGTH: ECC 256 VS RSA 2048 Security (in Bits) Key Length of RSA Key Length of ECC 80 1024 160-223 112 2048 224-255 128 3072 256-383 192 7680 384-511 The key length of RSA is measured in bits, and it typically ranges from 1024 to 4096 bits. The longer the key length, the stronger the encryption. For RSA, a key length of 2048 bits is considered the standard that is secure enough for most applications. When compared to RSA, ECC has a smaller key length compared to RSA. It is measured in terms of the size of the prime modulus, which typically ranges from 160 to 521 bits. For ECC, A key length of 256 bits is considered to be the standard.
  • 5. THE PERFORMANCE OF ECC AND RSA  Encryption/Decryption: ECC encryption and decryption operations are faster than RSA due to the use of elliptic curve mathematics.  Digital Signatures: Due to the application of elliptic curve mathematics, ECC digital signatures are faster than RSA  Bandwidth: The demand for bandwidth is less with ECC compared to RSA when transmitting data over a network.  Power Consumption: ECC drains less power than RSA, so it is more suitable for devices with limited power resources. If we have to give you a number- RSA is capable of responding to 450 requests per second with a 150-millisecond average response time, but ECC takes only 75 milliseconds to respond to the same number of requests per second.
  • 6. KEY GENERATION ECC key generation is faster and more computationally efficient compared to RSA key generation. This is because ECC key generation involves choosing a random elliptic curve over a finite field and selecting a random point as the public key. On the other hand, RSA key generation involves the selection of two large prime numbers and performing mathematical operations on them to generate the public and private keys.
  • 7. APPLICATIONS ECC is used in various protocols, including SSL/TLS, SSH, and IPSec, whereas RSA is mainly used in SSL/TLS and SSH. Rivest-Shamir-Adleman (RSA) Elliptic Curve Cryptography (ECC) RSA is one of the oldest and well-established public-key cryptography methods. ECC is comparatively a newer public-key cryptography method. Works on the principle of the prime factorization method. Works on the mathematical representation of elliptic curves. RSA runs faster as it is a simple algorithm. As it is complex in nature, ECC takes more time to run. Due to a lack of scalability, RSA has started becoming vulnerable. ECC is more secure thanks to its adaptive phase. Its application might scale up in the future. For implementing encryption, RSA demands bigger key lengths. Compared to RSA, ECC demands shorter key lengths. Standard Key length- 2,048 bits Standard Key length- 256 bits It supports all the platforms. It exhibits compatibility with new browsers and OS (some platforms like cPanel are not supported)
  • 8. IS ECC THE BEST FOR YOU? Elliptic curve cryptography is used in various organizations today, such as Facebook, Cloudflare, etc. So, is it ideal for you? As per the current scenario, RSA is the most widely used cryptosystem. It is used by over 90% of SSL certificates, while ECC is used by 4%. Now, by statistics, it may seem like it is not for you. But, trust us, the adoption of ECC is on the rise. If you have a website that requires powerful security and is complex, ECC could be the perfect match for you. However, note that the use of ECC requires implementation, and it needs to be handled carefully.
  • 9. THANK YOU !! THANK YOU !! THANK YOU !!