Security Analysis. This section focus on security analysis that comprises the cryptographic algorithm and protocols like SSL encryption, RSA, and ECC. While buying an SSL certificate, you should have a clear understanding of both of these terms. It may be utilized for the creation of smaller, more efficient, and much faster cryptography keys. Instead of using the traditional method to generate a product of very large prime numbers, it uses an elliptic curve equation to generate keys. ECC is used in the well-known cryptocurrency (i.e. Bitcoin etc). For hackers, it is really hard to crack the ECC algorithm that operates upon the Elliptic Curve Discrete Logarithm Problem (ECDLP). The ECC certificate has often smaller size because the information that is needed for exchanging for validation is less. For organizations having long- term security solutions as a primary concern, ECC may be an ideal choice. Also, hybrid SSLs can be utilized to use ECC instead of RSA-trusted root keys. A simple comparison can be shown in terms of the length of ciphering key between the RSA and the ECC can be stated in Table 1 according to the NIST (i.e. the National Institute of Standards and Technology) 31. Table 1. Comparison between RSA and ECC key strength32. 3 3072 256 4 7680 384 5 15360 521 Here is a quick comparison between RSA and ECC according to the NIST publication. It will help us to decide which is better in terms of security. From the above Table 1, this research concludes that the ratio of a key in size and its strength for the ECC compared with RSA is as follows: No.1 (1:7), No.2 (1:10), No.3 (1:12), No.4 (1:20), No.5 (1:30).
Appears in 2 contracts
Sources: Research Paper, Research Paper