9. the key are the RSA and the ECC
It is agreed that the asymmetric protocol is the safest protocol up to date. Although it requires more resources, is significantly slower, and is only convenient for small data transmission, the involvement of two keys instead of one makes this encryption method ideal for everyday use. The major algorithms used to generate the key are the RSA and the ECC, which use complex mathematical concepts that are currently unable to be reverse engineered by the current processing power of a computer. This protocol relies on the prime factorization equation to achieve a one-way encryption by taking two large random prime numbers and multiplying them to create a public key. On the other hand, the ECC algorithm relies on the algebraic structure of elliptic curves over finite fields, since there is no known solution to the mathematical problem given by the equation producing the elliptical curve in a graph, the current computing abilities cannot solve this equation either.
These two concepts are only valid since a conventional computer would need about 300 trillion years to crack communications protected with a 2,048-bit digital key, but a quantum computer powered by 4,099 qubits would need just 10 seconds. [1]
Security (In Bits)
RSA Key Length Required (In Bits)
ECC Key Length Required (In Bits)
BITS - 80
RSA - 1024
ECC - 160-223
BITS - 112
RSA - 2048
ECC- 224-255
BITS - 128
RSA - 3072
ECC - 256-383
BITS - 192
RSA - 7680
ECC - 384-511
BITS - 256
RSA - 15360
ECC - 512+
© Xatoxi LTD 2023, All Rights Reserved.