Size: 498
Comment: created
|
Size: 4744
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
//Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography [..] is the same level of security provided by keys of smaller size.// from [[https://en.wikipedia.org/wiki/Elliptic_curve_cryptography|Wikipedia]] 2015-11-05 |
=== Background: === |
Line 7: | Line 3: |
http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/1/ | * //"Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography [...] is the same level of security provided by keys of smaller size."//, [[https://en.wikipedia.org/wiki/Elliptic_curve_cryptography|ECC at Wikipedia]], 2015-11-05 * [[https://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/|Arstechnica: A relatively easy to understand primer on Elliptic Curve Cryptography]] * GnuPG 2.1 supports ECC. === Table of ECC supported functions: === |= Function |= Protocol |= Curve |= OpenPGP spec. |= Library dependency |=Token | | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[https://beta.csrc.nist.gov/Projects/Elliptic-Curve-Cryptography|NIST ECC]]: **[[http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf|P-256]]** | [[https://tools.ietf.org/html/rfc6637|RFC6637]] | |Gnuk 1.2| | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[https://beta.csrc.nist.gov/Projects/Elliptic-Curve-Cryptography|NIST ECC]]: **[[http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf|P-384]]** | [[https://tools.ietf.org/html/rfc6637|RFC6637]] | | | | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[https://beta.csrc.nist.gov/Projects/Elliptic-Curve-Cryptography|NIST ECC]]: **[[http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf|P-521]]** | [[https://tools.ietf.org/html/rfc6637|RFC6637]] | | | | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[http://www.ecc-brainpool.org/download.htm|ECC Brainpool]]: **[[https://tools.ietf.org/html/rfc5639|brainpoolP256r1]]** | | | | | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[http://www.ecc-brainpool.org/download.htm|ECC Brainpool]]: **[[https://tools.ietf.org/html/rfc5639|brainpoolP384r1]]** | | | | | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[http://www.ecc-brainpool.org/download.htm|ECC Brainpool]]: **[[https://tools.ietf.org/html/rfc5639|brainpoolP512r1]]** | | | | | Signature | [[https://en.wikipedia.org/wiki/Elliptic_Curve_DSA|ECDSA]] | [[http://www.secg.org/|SECG]]: **[[http://www.secg.org/sec2-v2.pdf|secp256k1]]** | |libgcrypt 1.7|Gnuk 1.2| | Signature | [[https://en.wikipedia.org/wiki/EdDSA|EdDSA]] | [[https://tools.ietf.org/html/rfc8032|RFC8032]]: **[[https://tools.ietf.org/html/rfc8032#section-5.1|Ed25519]]** | [[https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis|RFC4880bis draft]] | |Gnuk 1.2| | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[https://beta.csrc.nist.gov/Projects/Elliptic-Curve-Cryptography|NIST ECC]]: **[[http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf|P-256]]** | [[https://tools.ietf.org/html/rfc6637|RFC6637]] | |Gnuk 1.2| | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[https://beta.csrc.nist.gov/Projects/Elliptic-Curve-Cryptography|NIST ECC]]: **[[http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf|P-384]]** | [[https://tools.ietf.org/html/rfc6637|RFC6637]] | | | | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[https://beta.csrc.nist.gov/Projects/Elliptic-Curve-Cryptography|NIST ECC]]: **[[http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf|P-521]]** | [[https://tools.ietf.org/html/rfc6637|RFC6637]] | | | | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[http://www.ecc-brainpool.org/download.htm|ECC Brainpool]]: **[[https://tools.ietf.org/html/rfc5639|brainpoolP256r1]]** | | | | | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[http://www.ecc-brainpool.org/download.htm|ECC Brainpool]]: **[[https://tools.ietf.org/html/rfc5639|brainpoolP384r1]]** | | | | | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[http://www.ecc-brainpool.org/download.htm|ECC Brainpool]]: **[[https://tools.ietf.org/html/rfc5639|brainpoolP512r1]]** | | | | | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[http://www.secg.org/|SECG]]: **[[http://www.secg.org/sec2-v2.pdf|secp256k1]]** | |libgcrypt 1.7|Gnuk 1.2| | Encryption | [[https://en.wikipedia.org/wiki/ECDH|ECDH]] | [[https://tools.ietf.org/html/rfc7748|RFC7748]]: **[[https://tools.ietf.org/html/rfc7748#section-4.1|Curve25519]]** | |libgcrypt 1.7|Gnuk 1.2| |
Background:
- "Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography [...] is the same level of security provided by keys of smaller size.", ECC at Wikipedia, 2015-11-05
- GnuPG 2.1 supports ECC.
Table of ECC supported functions:
Function | Protocol | Curve | OpenPGP spec. | Library dependency | Token |
---|---|---|---|---|---|
Signature | ECDSA | NIST ECC: P-256 | RFC6637 | Gnuk 1.2 | |
Signature | ECDSA | NIST ECC: P-384 | RFC6637 | ||
Signature | ECDSA | NIST ECC: P-521 | RFC6637 | ||
Signature | ECDSA | ECC Brainpool: brainpoolP256r1 | |||
Signature | ECDSA | ECC Brainpool: brainpoolP384r1 | |||
Signature | ECDSA | ECC Brainpool: brainpoolP512r1 | |||
Signature | ECDSA | SECG: secp256k1 | libgcrypt 1.7 | Gnuk 1.2 | |
Signature | EdDSA | RFC8032: Ed25519 | RFC4880bis draft | Gnuk 1.2 | |
Encryption | ECDH | NIST ECC: P-256 | RFC6637 | Gnuk 1.2 | |
Encryption | ECDH | NIST ECC: P-384 | RFC6637 | ||
Encryption | ECDH | NIST ECC: P-521 | RFC6637 | ||
Encryption | ECDH | ECC Brainpool: brainpoolP256r1 | |||
Encryption | ECDH | ECC Brainpool: brainpoolP384r1 | |||
Encryption | ECDH | ECC Brainpool: brainpoolP512r1 | |||
Encryption | ECDH | SECG: secp256k1 | libgcrypt 1.7 | Gnuk 1.2 | |
Encryption | ECDH | RFC7748: Curve25519 | libgcrypt 1.7 | Gnuk 1.2 |