ALL IN ONE CCFPSM Certified Cyber Forensics Professional Certification, Exam Guide by Easttom Chuck

ALL IN ONE CCFPSM Certified Cyber Forensics Professional Certification, Exam Guide by Easttom Chuck

Author:Easttom, Chuck
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2014-08-28T16:00:00+00:00


Figure 7-4 Digital signatures

Elliptic Curve

This algorithm was first described in 1985 by Victor Miller (IBM) and Neal Koblitz (University of Washington). Elliptic curve cryptography (ECC) is based on the fact that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base point is difficult to the point of being impractical to do. There are a number of variations, such as ECC-DH (ECC Diffie-Hellman) and ECC-DSA (ECC Digital Signature Algorithm). The real strength of ECC base systems is that you can get just as much security with a smaller key than with other systems, like RSA. For example, a 384-bit ECC key is as strong as a 2048-bit RSA key.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.