xatoxi logos
xatoxi logos

9. the key are the RSA and the ECC

It is agreed that the asymmetric protocol is the safest protocol up to date. Although it requires more resources, is significantly slower, and is only convenient for small data transmission, the involvement of two keys instead of one makes this encryption method ideal for everyday use. The major algorithms used to generate the key are the RSA and the ECC, which use complex mathematical concepts that are currently unable to be reverse engineered by the current processing power of a computer. This protocol relies on the prime factorization equation to achieve a one-way encryption by taking two large random prime numbers and multiplying them to create a public key. On the other hand, the ECC algorithm relies on the algebraic structure of elliptic curves over finite fields, since there is no known solution to the mathematical problem given by the equation producing the elliptical curve in a graph, the current computing abilities cannot solve this equation either. 

These two concepts are only valid since a conventional computer would need about 300 trillion years to crack communications protected with a 2,048-bit digital key, but a quantum computer powered by 4,099 qubits would need just 10 seconds. [1] 

Security (In Bits)

RSA Key Length Required (In Bits)

ECC Key Length Required (In Bits)

BITS - 80

RSA - 1024

ECC - 160-223

BITS - 112

RSA - 2048

ECC- 224-255

BITS - 128

RSA - 3072

ECC - 256-383

BITS - 192

RSA - 7680

ECC - 384-511

BITS - 256

RSA - 15360

ECC - 512+

© Xatoxi LTD 2023, All Rights Reserved.