SlideShare a Scribd company logo
1 of 9
Download to read offline
DIFFERENCE BETWEEN
ECC AND RSA IN PUBLIC KEY ENCRYPTION
ALGORITHMS.
TRIPTI GOYAL
RSA stands for Rivest Shamir Adleman, and these are the names of the
inventors of this cryptographic algorithm.
Though it came into existence in 1977, in today’s time, RSA is widely used
for encrypting emails, software, website data, etc.
Its principle is based on the prime factorization method for one-way data
encryption. The process involved taking two large random prime numbers and
multiplying them together to develop a public key.
It is known as the modulus, and though it is made public, one cannot
determine what the message or piece of data was as the two prime numbers
are kept private.
WHAT IS RSA?
WHAT IS ECC?
Definition:
 ECC stands for Elliptic Curve Cryptography.
 It's an asymmetric cryptographic algorithm based on the algebraic structure of elliptic curves
over finite fields.
 Proposed by Neal Koblitz and Victor S in the 1980s.
 Gained prominence in 2004.
 Known for its resilience against attacks due to the difficulty of solving the mathematical
problem presented by the elliptic curve.
Security Measures:
 Tough to crack due to the mathematical complexity of ECDLP.
 No known solution to the elliptical curve mathematical problem.
 Potential attacks involve brute-force or trial-and-error approaches.
Comparative Strength:
 ECC provides strong security with smaller key sizes compared to traditional cryptographic
algorithms.
KEY LENGTH: ECC 256 VS RSA 2048
Security (in Bits) Key Length of RSA Key Length of ECC
80 1024 160-223
112 2048 224-255
128 3072 256-383
192 7680 384-511
The key length of RSA is measured in bits, and it typically ranges from 1024 to 4096 bits.
The longer the key length, the stronger the encryption. For RSA, a key length of 2048 bits is considered the
standard that is secure enough for most applications.
When compared to RSA, ECC has a smaller key length compared to RSA.
It is measured in terms of the size of the prime modulus, which typically ranges from 160 to 521 bits.
For ECC, A key length of 256 bits is considered to be the standard.
THE PERFORMANCE OF ECC AND RSA
 Encryption/Decryption: ECC encryption and decryption operations are faster
than RSA due to the use of elliptic curve mathematics.
 Digital Signatures: Due to the application of elliptic curve mathematics,
ECC digital signatures are faster than RSA
 Bandwidth: The demand for bandwidth is less with ECC compared to RSA when
transmitting data over a network.
 Power Consumption: ECC drains less power than RSA, so it is more suitable
for devices with limited power resources.
If we have to give you a number- RSA is capable of responding to 450
requests per second with a 150-millisecond average response time,
but ECC takes only 75 milliseconds to respond to the same number of
requests per second.
KEY GENERATION
ECC key generation is faster and more computationally efficient
compared to RSA key generation.
This is because ECC key generation involves choosing a random
elliptic curve over a finite field and selecting a random point
as the public key.
On the other hand, RSA key generation involves the selection of
two large prime numbers and performing mathematical operations on
them to generate the public and private keys.
APPLICATIONS
ECC is used in various protocols, including SSL/TLS, SSH, and
IPSec, whereas RSA is mainly used in SSL/TLS and SSH.
Rivest-Shamir-Adleman (RSA) Elliptic Curve Cryptography (ECC)
RSA is one of the oldest and well-established public-key
cryptography methods.
ECC is comparatively a newer public-key cryptography
method.
Works on the principle of the prime factorization
method.
Works on the mathematical representation of elliptic
curves.
RSA runs faster as it is a simple algorithm. As it is complex in nature, ECC takes more time to run.
Due to a lack of scalability, RSA has started becoming
vulnerable.
ECC is more secure thanks to its adaptive phase. Its
application might scale up in the future.
For implementing encryption, RSA demands bigger key
lengths.
Compared to RSA, ECC demands shorter key lengths.
Standard Key length- 2,048 bits Standard Key length- 256 bits
It supports all the platforms.
It exhibits compatibility with new browsers and OS
(some platforms like cPanel are not supported)
IS ECC THE BEST FOR YOU?
Elliptic curve cryptography is used in various organizations
today, such as Facebook, Cloudflare, etc. So, is it ideal for
you?
As per the current scenario, RSA is the most widely used
cryptosystem. It is used by over 90% of SSL certificates, while
ECC is used by 4%. Now, by statistics, it may seem like it is not
for you. But, trust us, the adoption of ECC is on the rise.
If you have a website that requires powerful security and is
complex, ECC could be the perfect match for you. However, note
that the use of ECC requires implementation, and it needs to be
handled carefully.
THANK YOU !!
THANK YOU !!
THANK YOU !!

More Related Content

Similar to Difference between ECC and RSA PublicKey

Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET Journal
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Project Proposal Presentation
Project Proposal PresentationProject Proposal Presentation
Project Proposal Presentationguest1a53eae
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 

Similar to Difference between ECC and RSA PublicKey (20)

RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
50620130101002
5062013010100250620130101002
50620130101002
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Project Proposal Presentation
Project Proposal PresentationProject Proposal Presentation
Project Proposal Presentation
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Difference between ECC and RSA PublicKey

  • 1. DIFFERENCE BETWEEN ECC AND RSA IN PUBLIC KEY ENCRYPTION ALGORITHMS. TRIPTI GOYAL
  • 2. RSA stands for Rivest Shamir Adleman, and these are the names of the inventors of this cryptographic algorithm. Though it came into existence in 1977, in today’s time, RSA is widely used for encrypting emails, software, website data, etc. Its principle is based on the prime factorization method for one-way data encryption. The process involved taking two large random prime numbers and multiplying them together to develop a public key. It is known as the modulus, and though it is made public, one cannot determine what the message or piece of data was as the two prime numbers are kept private. WHAT IS RSA?
  • 3. WHAT IS ECC? Definition:  ECC stands for Elliptic Curve Cryptography.  It's an asymmetric cryptographic algorithm based on the algebraic structure of elliptic curves over finite fields.  Proposed by Neal Koblitz and Victor S in the 1980s.  Gained prominence in 2004.  Known for its resilience against attacks due to the difficulty of solving the mathematical problem presented by the elliptic curve. Security Measures:  Tough to crack due to the mathematical complexity of ECDLP.  No known solution to the elliptical curve mathematical problem.  Potential attacks involve brute-force or trial-and-error approaches. Comparative Strength:  ECC provides strong security with smaller key sizes compared to traditional cryptographic algorithms.
  • 4. KEY LENGTH: ECC 256 VS RSA 2048 Security (in Bits) Key Length of RSA Key Length of ECC 80 1024 160-223 112 2048 224-255 128 3072 256-383 192 7680 384-511 The key length of RSA is measured in bits, and it typically ranges from 1024 to 4096 bits. The longer the key length, the stronger the encryption. For RSA, a key length of 2048 bits is considered the standard that is secure enough for most applications. When compared to RSA, ECC has a smaller key length compared to RSA. It is measured in terms of the size of the prime modulus, which typically ranges from 160 to 521 bits. For ECC, A key length of 256 bits is considered to be the standard.
  • 5. THE PERFORMANCE OF ECC AND RSA  Encryption/Decryption: ECC encryption and decryption operations are faster than RSA due to the use of elliptic curve mathematics.  Digital Signatures: Due to the application of elliptic curve mathematics, ECC digital signatures are faster than RSA  Bandwidth: The demand for bandwidth is less with ECC compared to RSA when transmitting data over a network.  Power Consumption: ECC drains less power than RSA, so it is more suitable for devices with limited power resources. If we have to give you a number- RSA is capable of responding to 450 requests per second with a 150-millisecond average response time, but ECC takes only 75 milliseconds to respond to the same number of requests per second.
  • 6. KEY GENERATION ECC key generation is faster and more computationally efficient compared to RSA key generation. This is because ECC key generation involves choosing a random elliptic curve over a finite field and selecting a random point as the public key. On the other hand, RSA key generation involves the selection of two large prime numbers and performing mathematical operations on them to generate the public and private keys.
  • 7. APPLICATIONS ECC is used in various protocols, including SSL/TLS, SSH, and IPSec, whereas RSA is mainly used in SSL/TLS and SSH. Rivest-Shamir-Adleman (RSA) Elliptic Curve Cryptography (ECC) RSA is one of the oldest and well-established public-key cryptography methods. ECC is comparatively a newer public-key cryptography method. Works on the principle of the prime factorization method. Works on the mathematical representation of elliptic curves. RSA runs faster as it is a simple algorithm. As it is complex in nature, ECC takes more time to run. Due to a lack of scalability, RSA has started becoming vulnerable. ECC is more secure thanks to its adaptive phase. Its application might scale up in the future. For implementing encryption, RSA demands bigger key lengths. Compared to RSA, ECC demands shorter key lengths. Standard Key length- 2,048 bits Standard Key length- 256 bits It supports all the platforms. It exhibits compatibility with new browsers and OS (some platforms like cPanel are not supported)
  • 8. IS ECC THE BEST FOR YOU? Elliptic curve cryptography is used in various organizations today, such as Facebook, Cloudflare, etc. So, is it ideal for you? As per the current scenario, RSA is the most widely used cryptosystem. It is used by over 90% of SSL certificates, while ECC is used by 4%. Now, by statistics, it may seem like it is not for you. But, trust us, the adoption of ECC is on the rise. If you have a website that requires powerful security and is complex, ECC could be the perfect match for you. However, note that the use of ECC requires implementation, and it needs to be handled carefully.
  • 9. THANK YOU !! THANK YOU !! THANK YOU !!