TY - GEN
T1 - On the strength comparison of the ECDLP and the IFP
AU - Yasuda, Masaya
AU - Shimoyama, Takeshi
AU - Kogure, Jun
AU - Izu, Tetsuya
PY - 2012/10/1
Y1 - 2012/10/1
N2 - At present, the RSA cryptosystem is most widely used in public key cryptography. On the other hand, elliptic curve cryptography (ECC) has recently received much attention since smaller ECC key sizes provide the same security level as RSA. Although there are a lot of previous works that analyze the security of ECC and RSA, the comparison of strengths varies depending on analysis. The aim of this paper is once again to compare the security strengths, considering state-of-the-art of theory and experiments. The security of RSA is closely related to the hardness of the integer factorization problem (IFP), while the security of ECC is closely related to the elliptic curve discrete logarithm problem (ECDLP). In this paper, we compare the computing power required to solve the ECDLP and the IFP, respectively, and estimate the sizes of the problems that provide the same level of security.
AB - At present, the RSA cryptosystem is most widely used in public key cryptography. On the other hand, elliptic curve cryptography (ECC) has recently received much attention since smaller ECC key sizes provide the same security level as RSA. Although there are a lot of previous works that analyze the security of ECC and RSA, the comparison of strengths varies depending on analysis. The aim of this paper is once again to compare the security strengths, considering state-of-the-art of theory and experiments. The security of RSA is closely related to the hardness of the integer factorization problem (IFP), while the security of ECC is closely related to the elliptic curve discrete logarithm problem (ECDLP). In this paper, we compare the computing power required to solve the ECDLP and the IFP, respectively, and estimate the sizes of the problems that provide the same level of security.
UR - http://www.scopus.com/inward/record.url?scp=84866666345&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84866666345&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-32928-9_17
DO - 10.1007/978-3-642-32928-9_17
M3 - Conference contribution
AN - SCOPUS:84866666345
SN - 9783642329272
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 302
EP - 325
BT - Security and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings
T2 - 8th International Conference on Security and Cryptography for Networks, SCN 2012
Y2 - 5 September 2012 through 7 September 2012
ER -