Discussion:
ECC practical to use in Encryption and Decryption?
(too old to reply)
Jasmine Hau
2003-12-04 17:28:32 UTC
Permalink
Hi, I am a student doing my research on ECC-based mutual
authentication and key agreement protocol targeted on smart card.

After the mutual authentication and key agreement protocol, a
session key will be established to encrypt the message sending between
the smart card and the server using symmetric cryptography such as AES
or 3-DES.

As we know,the ECC has the bandwidth savings, faster
implementations, lower power requirements and smaller hardware
processors. I wish to ask is it practical if we implement the ECC in
encryption and decryption instead of using symmetric key cryptography.
Is there any weaknessor vulnerable to attack??? Does the ECC just
suitable to generate the digital signature and encrypt the secret
session key only???

I will be very thankful if you can answer my question. Thank you
very much.
Gregory G Rose
2003-12-04 23:58:05 UTC
Permalink
Post by Jasmine Hau
Hi, I am a student doing my research on ECC-based mutual
authentication and key agreement protocol targeted on smart card.
After the mutual authentication and key agreement protocol, a
session key will be established to encrypt the message sending between
the smart card and the server using symmetric cryptography such as AES
or 3-DES.
As we know,the ECC has the bandwidth savings, faster
implementations, lower power requirements and smaller hardware
processors. I wish to ask is it practical if we implement the ECC in
encryption and decryption instead of using symmetric key cryptography.
Is there any weaknessor vulnerable to attack??? Does the ECC just
suitable to generate the digital signature and encrypt the secret
session key only???
I will be very thankful if you can answer my question. Thank you
very much.
ECC is still many orders of magnitude slower than
any symmetric crypto primitive.

Greg.
--
Greg Rose
232B EC8F 44C6 C853 D68F E107 E6BF CD2F 1081 A37C
Qualcomm Australia: http://www.qualcomm.com.au
Jasmine Hau
2003-12-07 04:21:50 UTC
Permalink
Although the ECC is still many orders of magnitude slower than
any symmetric crypto primitive like AES and DES, but does its
performance is acceptable if just use to encrypt and decrypt a very
small size of data such as user detail in Smart Card or any smart
token???

Besides, does anybody who has make comparison between the ECES
performance with any other symmetric cryptography??? I need a detail
analysis result as my reference. Can anyone suggest me a good sources
or websites to find more detail in ECES??? Thanks a lot....^_^

I will be thankful if anyone can answer my question. Wish you
have a nice day.
Nicholas C. Weaver
2003-12-07 04:22:15 UTC
Permalink
Post by Jasmine Hau
Hi, I am a student doing my research on ECC-based mutual
authentication and key agreement protocol targeted on smart card.
After the mutual authentication and key agreement protocol, a
session key will be established to encrypt the message sending between
the smart card and the server using symmetric cryptography such as AES
or 3-DES.
As we know,the ECC has the bandwidth savings, faster
implementations, lower power requirements and smaller hardware
processors. I wish to ask is it practical if we implement the ECC in
encryption and decryption instead of using symmetric key cryptography.
Is there any weaknessor vulnerable to attack??? Does the ECC just
suitable to generate the digital signature and encrypt the secret
session key only???
Asymmetric encryption (ECC, RSA, DSA, etc) all are VASTLY more
expensive than block cyphers. So you only want to use the asymmetric
algorithm for tasks such as encrypting the session key, creating and
verifying a signature on a hash etc... Everything else should use the
symmetric cypher.

AES is the choice for block cyphers, in hardware it is only slighly
less efficient than 3DES, and it is much better in software than 3DES.
--
Nicholas C. Weaver ***@cs.berkeley.edu
Nicholas C. Weaver
2003-12-14 21:43:52 UTC
Permalink
Post by Jasmine Hau
Hi, I am a student doing my research on ECC-based mutual
authentication and key agreement protocol targeted on smart card.
After the mutual authentication and key agreement protocol, a
session key will be established to encrypt the message sending between
the smart card and the server using symmetric cryptography such as AES
or 3-DES.
As we know,the ECC has the bandwidth savings, faster
implementations, lower power requirements and smaller hardware
processors. I wish to ask is it practical if we implement the ECC in
encryption and decryption instead of using symmetric key cryptography.
Is there any weaknessor vulnerable to attack??? Does the ECC just
suitable to generate the digital signature and encrypt the secret
session key only???
Asymmetric encryption (ECC, RSA, DSA, etc) all are VASTLY more
expensive than block cyphers. So you only want to use the asymmetric
algorithm for tasks such as encrypting the session key, creating and
verifying a signature on a hash etc... Everything else should use the
symmetric cypher.

AES is the choice for block cyphers, in hardware it is only slighly
less efficient than 3DES, and it is much better in software than 3DES.
--
Nicholas C. Weaver ***@cs.berkeley.edu
Loading...