RSAand ECC is compared with their key size, key generation, bandwidth andefficiency RSA key generation is significantly slower than ECC key generation.
ECC is 10 time than that of RSA computational speed. Encryption in ECC is muchfooter than RSA.ECC generate smaller key size.
The enhanced ECC algorithm basedon network information security. The original operation efficiency and safetyperformance can be increased by original dot product operation optimization andsquare residual determination optimization algorithm and transformation to theprivate key. ECC is used in OpenSSL security protocol for increasing thesecurity and speeding the access of information on web server. SSL normallyused RSA algorithm but enchaining OpenSSL by ECC will decrease the load of webserver due to its smaller key sizes.
SSL protocol higher the work load andresponse time of web server but it is important for security.so that we haveRSA in SSL with ECC. which gives lesser response time of HTTPS. comparison hasa been done between RSA and ECC using file HTTPS transaction on different sizesof file the result concludes the ECC HTTPS request handing time is less 11.III. WORKING METHODOLOGYCryptographic algorithms is been used to ensure security incommunication channels and networks. Thecombinations of cryptographic algorithm for encryption and decryption is called as cipher suites, which have wellunderstood security properties.
Therefore, compromising security of thesealgorithms implies compromising security of communication systems that areusing them. ECC cryptographic algorithm has been considered in ciphersuite for encryption between client and server. There is combination ofalgorithm is included in cipher suites for handshake between client and server.The ECC-based cipher suite is been negotiated by the client and server. TheElliptic Curve Diffie Hellman (ECDH) key exchange and the Elliptic CurveDigital Signature Algorithm (ECDSA) are elliptic curve counterparts of the wellknow Diffie-Hellman and DSA algorithms, that has replaced Diffie Hellman andDSA in cipher suite. Entire security depends on cipher suite used in SSL.
Forimproving the security and preventing double attack scalar multiplication ofECC is performed. The Secure Sockets Layer (SSL) protocol uses a combinationof public-key and symmetric-key encryption. Symmetric-key encryption is muchfaster than public-key encryption; but public-key encryption provides betterauthentication and security. The Handshake protocol and the Record Layer protocolare main component of SSL. The Handshake protocol is bee used by SSL client andserver to negotiate a common cipher suite, authenticate each other, and establisha shared master secret using public-key. The Record Layer gets symmetric keysfrom the master secret and uses them with faster symmetric-key algorithms forbulk encryption and authentication of application data. Since public-keyoperations are expensive in term of computation, the protocol’s designersprovided the ability for a client and server to reuse a previously establishedmaster secret. This ability of session reuse is also known as “sessionresumption”.