• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

[JAVA] cryptography security with elliptic curve

 
Greenhorn
Posts: 2
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Im nebbies on elliptic curve cryptography and i need help to understand if i did good work : i use Java and bouncycastle and i must to generate public and private key from Ecc curve . I take 3 different kind of code from web , but im not sure which is the best . I read that the curve must generate in RANDOM mode for security , but i dont understand how

I've some question :
1)which of this code is the most secure and why?
2)what is the meaning of this :" 192 bit ecc is like 2048 bit rsa"? which is the size of private and public key in Ecc prime192v1? and in another? why?
3)how generate random curve ?how can generate random private and public key?
can anyone help me?
thanks so much















thanks
 
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Responding to one of your questions in part (2), where you asked, "what is the meaning of this :" 192 bit ecc is like 2048 bit rsa"?"
According to the following sources, 224-bit ECC (not 192-bit ECC) is like 2048-bit RSA:
http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf
http://www.certicom.com/index.php/the-basics-of-ecc
http://www.juniper.net/techpubs/en_US/sa/topics/reference/general/secure-access-ecc-about.html

Bruce Schneier recommends against using ECC systems: http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
 
reply
    Bookmark Topic Watch Topic
  • New Topic