The features of1.RSA (rivest Shamir Adleman) algorithm:
1 has a long history. RSA is an international standard algorithm, which was first described in 1970s. It is well understood and used for secure data transmission. For decades, it has been used as an encryption scheme, in which the public key is used to encrypt information and the private key is used to decrypt information.
2.RSA is based on the difficulty of large integer decomposition. Decomposition of large integers to identify prime numbers is processor-intensive, so it is very effective as a defense measure so far. However, it brings overhead, such as slow key generation and the biggest consumption of computer resources.
3. Scalability is not optimal. This is a major defect when we know that the proliferation of networked devices (Internet of Things) will put forward requirements for systems that are expected to be outdated by 2030. RSA is vulnerable to quantum computer and brute force attacks, so a new algorithm is needed, which can provide better performance for the specified security level.
4. Very fast and simple encryption. RSA encryption is based on a simple principle and can run faster than ECC under appropriate circumstances. RSA may not be scalable, but in some cases, such as for internal organizations, it may be faster. In RSA, reliability and security depend on the difficulty of integer decomposition.
Second, the characteristics of ECC (Elliptic Curve Cryptography) algorithm:
1 depends on the detection of individual logarithm of random elliptic curve. ECC algorithm is suitable for the discrete logarithm problem of elliptic curve which is difficult for hackers to solve. There is no known solution to the mathematical problem of generating elliptic curves in graphs, so the only solution is to try random numbers. However, the size of each bit provides more options than RSA, which makes the brute force cracking method unlikely to succeed.
2. The short key in 2.ECC encryption is as strong as the long key in RSA. This will greatly reduce the network overhead, thus achieving faster performance and better customer or user experience. This also means that in the long run, there is more room for growth, because in RSA, each additional bit provides more choices than each additional bit. This also means that with the passage of time, the growth of bit length will slow down, which makes it more scalable in the Internet of Things.
3. Small certificate size. Similarly, the information required for exchange verification is obviously less than that of RAS, which reduces the network overhead and improves the performance, thus improving the user or customer experience. It also improves scalability by providing an environment in which the server can handle increased traffic without changing the infrastructure due to low overhead.
4.CPU consumption and memory utilization are low. For the client and server, this is an improved experience, which simplifies the connection and simplifies the process. ECC consumes less computing power and battery resources. RSA certificate can accommodate 450 requests per second, and the average response time is 150ms, while ECC only needs 75ms to respond to the same number of requests per second. When the server communicates with the desktop, ECC has excellent response time.
5. Support RSA trusted root certificate. For some organizations, websites must run successfully on old devices. In this case, every organization must consider hybrid certificate technology, which allows ECC algorithm and even supports RSA trusted root certificate.
To sum up, RSA algorithm is applied earlier, with a wide range of applications and good compatibility, but it consumes a lot of server performance. ECC algorithm is the mainstream of the new generation algorithm, which has the advantages of fast encryption speed, higher efficiency, low server resource consumption, and most importantly, it is safer and more resistant to attacks. The two algorithms have their own advantages, but in the long run, RSA may be replaced by ECC.