21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Elliptic curve cryptography can provide the same levels of security with much smaller<br />

key sizes and with faster algorithms, but this type of cryptography is not yet in widespread<br />

use.<br />

Discussion<br />

Be sure to see the general recommendations for using public key cryptography<br />

in Recipe 7.1.<br />

Security-wise, there’s no real reason to choose any one of the common algorithms<br />

over the others. There are also no intellectual property restrictions on any of these<br />

algorithms (though there may be on some elliptic curve variants). RSA definitely sees<br />

the most widespread use.<br />

RSA private key operations can be made much faster than operations in other algorithms,<br />

which is a major reason it’s preferred in many circumstances. Public key<br />

operations across RSA and the two other major algorithms (Diffie-Hellman and<br />

DSA) tend to be about the same speed.<br />

When signing messages, RSA tends to be about the same speed or perhaps a bit<br />

slower than DSA, but it is about 10 times faster for verification, if implemented properly.<br />

RSA is generally much preferable for key establishment, because some protocols<br />

can minimize server load better if they’re based on RSA.<br />

Elliptic curve cryptography is appealing in terms of efficiency, but there is a practical<br />

downside in that the standard in this space (IEEE P1363) requires licensing patents<br />

from Certicom. We believe you can probably implement nonstandard yet still secure<br />

elliptic curve cryptosystems that completely avoid any patent restrictions, but we<br />

would never pursue such a thing without first obtaining legal counsel.<br />

See Also<br />

Recipe 7.1<br />

7.3 Selecting Public Key Sizes<br />

<strong>Problem</strong><br />

You’ve decided to use public key cryptography, and you need to know what size<br />

numbers you should use in your system. For example, if you want to use RSA,<br />

should you use 512-bit RSA or 4,096-bit RSA?<br />

312 | Chapter 7: Public Key Cryptography<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!