What IS Eliptic Curve Cryptography ECC SSL Certificate Uganda

The situation in information security field is constantly changing. Hack attempts are becoming more and more impudent and complex. Intruders develop elaborate and multistage break-in methods. In this situation remaining up-to-date with progressing technology is a basic and necessary step in digital data protection. That is why Certificate Authorities are always working on developing new solutions and improving existing ones, which allows keeping on-line information security on the highest level. The Public key cryptography and Digital certificates serve to provide a new level of authentication, privacy and personal data transmitting security that cannot be maintained by passphrases and passwords alone.

So far, major key algorithms, RSA and DSA, have experienced a wide application in the Internet security field. And after more than 30 years of success modern ECDSA (Elliptic Curve Digital Signature Algorithm) keys come on the stage.

DSA, RSA and ECDSA: looking back

DSA (Digital Signature Algorithm) is an algorithm for digital signature generation with the means of Private/Public Keys pair. The signature is created secretly but can be identified publicly. This means that only one subject can actually create the signature of the message using the Private Key, but anyone can verify its adequacy having a corresponding Public Key. This algorithm has been offered by the National Institute of Standards and Technology (NIST) back in August 1991 and proclaimed along with SHA-1 hash function as a part of DSS (Digital Signature Standard) in 1994.

RSA (abbreviation of scientists last names Ron Rivest, Adi Shamir, and Leonard Adleman), apart from DSA, has become the first cryptosystem applicable for digital signature and data encrypting, even though the idea has been first exposed to light in 1978. RSA algorithm implies three main steps: key pair generation, encryption and decryption. A public key is transmitted over an open channel, while the Private Key remains secret. The data, which is encrypted with the Private Key, can only be decrypted with the Public Key, which is mathematically linked to a Private one. RSA can be used to determine the data source origin.

ECDSA (Elliptic Curve Digital Signature Algorithm) which is based on DSA, a part of Elliptic Curve Cryptography, which is just a mathematical equation on its own. ECDSA is the algorithm, that makes Elliptic Curve Cryptography useful for security. Neal Koblitz and Victor S. Miller independently suggested the use of elliptic curves in cryptography in 1985, and a wide performance was gained in 2004 and 2005. It differs from DSA due to that fact that it is applicable not over the whole numbers of a finite field but to certain points of elliptic curve to define Public/Private Keys pair.

ECC certificates: pros and cons

Being a golden standard by far, RSA key algorithm is the one, which is most widely used in the digital security. However, according to the modern tendency of using mobile and compact devices, ˜pure web performance stands up at the head of the whole business. From this perspective the physical size of the key is a predominant question.

DSA and RSA key algorithms require a larger key size and could be defeated by factoring a large number. When it comes to ECDSA, the Elliptic Curve Discrete Logarithm Problem (ECDLP) needs to be solved in order to break the key, and there was no major progress so far to achieve this. Thus ECC certificate provides a better security solution and is more difficult to break using usual hackers ˜brute force methods.

Shorter key size is definitely among the advantages as well. In the table below we compared RSA and ECDSA Key sizes for a better layout

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

How to Password Protect a Directory Uganda

This tutorial will teach how to password protect a directory. Password protecting a directory...

How To Use The IP Deny Manager Uganda

This tutorial will teach you how to use the IP Deny Manager to block access to your web site from...

Using Hotlink Protection Uganda

Hotlink Protection prevents other web sites from directly linking to certain files (typically...

CAPTCHA Telling Humans and Computers Apart Automatically Uganda

This tutorial is to explain CAPTCHA, an acronym which stands for "Completely Automated Public...

Critical PHPMailer Flaw leaves Millions of Websites Vulnerable Uganda

Dec 25 2016: A critical vulnerability has been discovered in PHPMailer, which is one of the most...

Powered by WHMCompleteSolution