![]() | 6.6 ECES ~ Comments
The Elliptic Curve Encryption Scheme in real applications require larger numbers than what was shown in the previous examples. A real application would require a key size of m = 155 in the field of F2m. Even though the ECES is the primary function of the Elliptic Curve Cryptosystem, a real ECC also implements the use of digital signatures, hash functions and other protocols to not only ensure confidentiality, but also user authentication, data integrity and non-repudiation.
The Elliptic Curve Cryptosystem is far stronger and faster then other known public key-systems. Offering the highest strength-per-bit of any public-key system, ECC is highly efficient due to the smaller key sizes and reduced computation required by the algorithm. This marks the end of the ECC Classroom.
Thank you for visiting. |
![]()
![]() ![]() |
|