SlideShare a Scribd company logo
1 of 9
Download to read offline
DIFFERENCE BETWEEN
ECC AND RSA IN PUBLIC KEY ENCRYPTION
ALGORITHMS.
TRIPTI GOYAL
RSA stands for Rivest Shamir Adleman, and these are the names of the
inventors of this cryptographic algorithm.
Though it came into existence in 1977, in today’s time, RSA is widely used
for encrypting emails, software, website data, etc.
Its principle is based on the prime factorization method for one-way data
encryption. The process involved taking two large random prime numbers and
multiplying them together to develop a public key.
It is known as the modulus, and though it is made public, one cannot
determine what the message or piece of data was as the two prime numbers
are kept private.
WHAT IS RSA?
WHAT IS ECC?
Definition:
 ECC stands for Elliptic Curve Cryptography.
 It's an asymmetric cryptographic algorithm based on the algebraic structure of elliptic curves
over finite fields.
 Proposed by Neal Koblitz and Victor S in the 1980s.
 Gained prominence in 2004.
 Known for its resilience against attacks due to the difficulty of solving the mathematical
problem presented by the elliptic curve.
Security Measures:
 Tough to crack due to the mathematical complexity of ECDLP.
 No known solution to the elliptical curve mathematical problem.
 Potential attacks involve brute-force or trial-and-error approaches.
Comparative Strength:
 ECC provides strong security with smaller key sizes compared to traditional cryptographic
algorithms.
KEY LENGTH: ECC 256 VS RSA 2048
Security (in Bits) Key Length of RSA Key Length of ECC
80 1024 160-223
112 2048 224-255
128 3072 256-383
192 7680 384-511
The key length of RSA is measured in bits, and it typically ranges from 1024 to 4096 bits.
The longer the key length, the stronger the encryption. For RSA, a key length of 2048 bits is considered the
standard that is secure enough for most applications.
When compared to RSA, ECC has a smaller key length compared to RSA.
It is measured in terms of the size of the prime modulus, which typically ranges from 160 to 521 bits.
For ECC, A key length of 256 bits is considered to be the standard.
THE PERFORMANCE OF ECC AND RSA
 Encryption/Decryption: ECC encryption and decryption operations are faster
than RSA due to the use of elliptic curve mathematics.
 Digital Signatures: Due to the application of elliptic curve mathematics,
ECC digital signatures are faster than RSA
 Bandwidth: The demand for bandwidth is less with ECC compared to RSA when
transmitting data over a network.
 Power Consumption: ECC drains less power than RSA, so it is more suitable
for devices with limited power resources.
If we have to give you a number- RSA is capable of responding to 450
requests per second with a 150-millisecond average response time,
but ECC takes only 75 milliseconds to respond to the same number of
requests per second.
KEY GENERATION
ECC key generation is faster and more computationally efficient
compared to RSA key generation.
This is because ECC key generation involves choosing a random
elliptic curve over a finite field and selecting a random point
as the public key.
On the other hand, RSA key generation involves the selection of
two large prime numbers and performing mathematical operations on
them to generate the public and private keys.
APPLICATIONS
ECC is used in various protocols, including SSL/TLS, SSH, and
IPSec, whereas RSA is mainly used in SSL/TLS and SSH.
Rivest-Shamir-Adleman (RSA) Elliptic Curve Cryptography (ECC)
RSA is one of the oldest and well-established public-key
cryptography methods.
ECC is comparatively a newer public-key cryptography
method.
Works on the principle of the prime factorization
method.
Works on the mathematical representation of elliptic
curves.
RSA runs faster as it is a simple algorithm. As it is complex in nature, ECC takes more time to run.
Due to a lack of scalability, RSA has started becoming
vulnerable.
ECC is more secure thanks to its adaptive phase. Its
application might scale up in the future.
For implementing encryption, RSA demands bigger key
lengths.
Compared to RSA, ECC demands shorter key lengths.
Standard Key length- 2,048 bits Standard Key length- 256 bits
It supports all the platforms.
It exhibits compatibility with new browsers and OS
(some platforms like cPanel are not supported)
IS ECC THE BEST FOR YOU?
Elliptic curve cryptography is used in various organizations
today, such as Facebook, Cloudflare, etc. So, is it ideal for
you?
As per the current scenario, RSA is the most widely used
cryptosystem. It is used by over 90% of SSL certificates, while
ECC is used by 4%. Now, by statistics, it may seem like it is not
for you. But, trust us, the adoption of ECC is on the rise.
If you have a website that requires powerful security and is
complex, ECC could be the perfect match for you. However, note
that the use of ECC requires implementation, and it needs to be
handled carefully.
THANK YOU !!
THANK YOU !!
THANK YOU !!

More Related Content

Similar to Difference between ECC and RSA PublicKey

Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET Journal
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Project Proposal Presentation
Project Proposal PresentationProject Proposal Presentation
Project Proposal Presentationguest1a53eae
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 

Similar to Difference between ECC and RSA PublicKey (20)

RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
50620130101002
5062013010100250620130101002
50620130101002
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Project Proposal Presentation
Project Proposal PresentationProject Proposal Presentation
Project Proposal Presentation
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Difference between ECC and RSA PublicKey

  • 1. DIFFERENCE BETWEEN ECC AND RSA IN PUBLIC KEY ENCRYPTION ALGORITHMS. TRIPTI GOYAL
  • 2. RSA stands for Rivest Shamir Adleman, and these are the names of the inventors of this cryptographic algorithm. Though it came into existence in 1977, in today’s time, RSA is widely used for encrypting emails, software, website data, etc. Its principle is based on the prime factorization method for one-way data encryption. The process involved taking two large random prime numbers and multiplying them together to develop a public key. It is known as the modulus, and though it is made public, one cannot determine what the message or piece of data was as the two prime numbers are kept private. WHAT IS RSA?
  • 3. WHAT IS ECC? Definition:  ECC stands for Elliptic Curve Cryptography.  It's an asymmetric cryptographic algorithm based on the algebraic structure of elliptic curves over finite fields.  Proposed by Neal Koblitz and Victor S in the 1980s.  Gained prominence in 2004.  Known for its resilience against attacks due to the difficulty of solving the mathematical problem presented by the elliptic curve. Security Measures:  Tough to crack due to the mathematical complexity of ECDLP.  No known solution to the elliptical curve mathematical problem.  Potential attacks involve brute-force or trial-and-error approaches. Comparative Strength:  ECC provides strong security with smaller key sizes compared to traditional cryptographic algorithms.
  • 4. KEY LENGTH: ECC 256 VS RSA 2048 Security (in Bits) Key Length of RSA Key Length of ECC 80 1024 160-223 112 2048 224-255 128 3072 256-383 192 7680 384-511 The key length of RSA is measured in bits, and it typically ranges from 1024 to 4096 bits. The longer the key length, the stronger the encryption. For RSA, a key length of 2048 bits is considered the standard that is secure enough for most applications. When compared to RSA, ECC has a smaller key length compared to RSA. It is measured in terms of the size of the prime modulus, which typically ranges from 160 to 521 bits. For ECC, A key length of 256 bits is considered to be the standard.
  • 5. THE PERFORMANCE OF ECC AND RSA  Encryption/Decryption: ECC encryption and decryption operations are faster than RSA due to the use of elliptic curve mathematics.  Digital Signatures: Due to the application of elliptic curve mathematics, ECC digital signatures are faster than RSA  Bandwidth: The demand for bandwidth is less with ECC compared to RSA when transmitting data over a network.  Power Consumption: ECC drains less power than RSA, so it is more suitable for devices with limited power resources. If we have to give you a number- RSA is capable of responding to 450 requests per second with a 150-millisecond average response time, but ECC takes only 75 milliseconds to respond to the same number of requests per second.
  • 6. KEY GENERATION ECC key generation is faster and more computationally efficient compared to RSA key generation. This is because ECC key generation involves choosing a random elliptic curve over a finite field and selecting a random point as the public key. On the other hand, RSA key generation involves the selection of two large prime numbers and performing mathematical operations on them to generate the public and private keys.
  • 7. APPLICATIONS ECC is used in various protocols, including SSL/TLS, SSH, and IPSec, whereas RSA is mainly used in SSL/TLS and SSH. Rivest-Shamir-Adleman (RSA) Elliptic Curve Cryptography (ECC) RSA is one of the oldest and well-established public-key cryptography methods. ECC is comparatively a newer public-key cryptography method. Works on the principle of the prime factorization method. Works on the mathematical representation of elliptic curves. RSA runs faster as it is a simple algorithm. As it is complex in nature, ECC takes more time to run. Due to a lack of scalability, RSA has started becoming vulnerable. ECC is more secure thanks to its adaptive phase. Its application might scale up in the future. For implementing encryption, RSA demands bigger key lengths. Compared to RSA, ECC demands shorter key lengths. Standard Key length- 2,048 bits Standard Key length- 256 bits It supports all the platforms. It exhibits compatibility with new browsers and OS (some platforms like cPanel are not supported)
  • 8. IS ECC THE BEST FOR YOU? Elliptic curve cryptography is used in various organizations today, such as Facebook, Cloudflare, etc. So, is it ideal for you? As per the current scenario, RSA is the most widely used cryptosystem. It is used by over 90% of SSL certificates, while ECC is used by 4%. Now, by statistics, it may seem like it is not for you. But, trust us, the adoption of ECC is on the rise. If you have a website that requires powerful security and is complex, ECC could be the perfect match for you. However, note that the use of ECC requires implementation, and it needs to be handled carefully.
  • 9. THANK YOU !! THANK YOU !! THANK YOU !!