06.09.2021 Views

Elementary Abstract Algebra- Examples and Applications, 2019a

Elementary Abstract Algebra- Examples and Applications, 2019a

Elementary Abstract Algebra- Examples and Applications, 2019a

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

552 CHAPTER 13 FURTHER TOPICS IN CRYPTOGRAPHY<br />

slowing down communication. Elliptic curve cryptography (ECC) is one<br />

approach to the public key sharing dilemma that offers greater security with<br />

smaller keys. The table in Figure 13.2.1 shows the relationship between key<br />

length <strong>and</strong> security for three different cryptosystems: RSA, Diffie-Hellman,<br />

<strong>and</strong> ECC. In the table, ‘key length’ refers to the number of binary bits in the<br />

key: for comparison, a 160 bit key has 49 decimal digits, while a 1024 bit key<br />

has 309 decimal digits. The ’security level’ is also measured in bits (80, 128,<br />

192, 256) where these bits refer to the size of the number of computational<br />

steps necessary to break the code. For example, a security level of 80 means<br />

that 2 80 computations are required to break the code (from reference(5)).<br />

To give you an idea of what this means practically, in 2002 it took 10, 000<br />

computers (mainly PCs) running 24 hours a day for 549 days to break an<br />

ECC system with a 109 bit key length. A 160-bit ECC would be 2 25 times<br />

more secure: which means that (with 2002 technology) it would take one<br />

billion computers over 500 years to crack it.<br />

Figure 13.2.1. Key bit lengths of cryptosystems for different security levels<br />

recommended by the National Institute of St<strong>and</strong>ards <strong>and</strong> Technology, (from<br />

reference (8))<br />

Referencing the table in Figure 13.2.1, we can see that an ECC cryptosystem<br />

with a 160 bit key has a similar security level to RSA <strong>and</strong> Diffie-<br />

Hellman with 1024-bit keys. This means the same security with 6 times less<br />

information–a significant difference!<br />

Exercise 13.2.1. How long would it take to crack a cryptosystem with a<br />

128 bit security, using a billion modern computers with 2 GHz processors?<br />

(Note: A 2 GHz processor is able to perform 2·10 9 computations per second.)<br />

♦<br />

Now that we’ve described the benefits of ECC, let’s see what elliptic<br />

curves are all about. Our discussion will be quite wide-ranging, <strong>and</strong> touch on

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!