Author

Topic: Why does 256-bit ECC offers equivalent security of 128-bit symmetric encryption? (Read 853 times)

donator
Activity: 1218
Merit: 1079
Gerald Davis
Everything is compared to symmetric encryption because baring a flaw in the algorithm there is no method to find a symmetric encryption key faster than O(n) steps.  All other algorithms have solutions than can be found in less steps.

ECC is "secure" because the Elliptic Curve Discrete Logarithm Problem is infeasible for large sets however there are solutions to the ECDLP which are faster than O(n) but the fastest (such as pollard's rho) is still O(n1/2).  Since the solution can be found in faster than O(n) steps it requires a larger key for an equivalent level of security.

Keep in mind that the ratio of relationship of O(n1/2) between key size and bit strength only applies to ECC and only because there no faster solution is currently known.   This can change over time.  The strength of a given RSA key has declined over time as faster solutions to the integer factorization problem have been found.  Today to achieve '128 bit security' requires a 3,072 bit RSA key.
sr. member
Activity: 467
Merit: 267
It's because the best algo that solves the EC discrete log problem is in O(sqrt(N)).
full member
Activity: 209
Merit: 100
I've been studying ECDSA from Royal Fork for a few weeks now, and I think I'm starting to get it. Some question remains.

Why is it that 256-bits of ECC only offers equivalent security of say, 128-bit AES?

Is it because of the birthday paradox? Or is it something else?
Jump to: