Re: AW: Reasons to include ECC to our charter

"Shawn C. Masters" <scm@imstumped.com> Wed, 05 September 2001 14:14 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA03600 for <openpgp-archive@odin.ietf.org>; Wed, 5 Sep 2001 10:14:44 -0400 (EDT)
Received: from localhost (localhost [[UNIX: localhost]]) by above.proper.com (8.11.6/8.11.3) id f85DurA18635 for ietf-openpgp-bks; Wed, 5 Sep 2001 06:56:53 -0700 (PDT)
Received: from fs.imstumped.com (arielle.dsl.patriot.net [209.249.182.205]) by above.proper.com (8.11.6/8.11.3) with ESMTP id f85DuqD18631 for <ietf-openpgp@imc.org>; Wed, 5 Sep 2001 06:56:52 -0700 (PDT)
Received: from localhost (scm@localhost) by fs.imstumped.com (8.11.0/8.11.0) with ESMTP id f85DuU323335; Wed, 5 Sep 2001 09:56:30 -0400
Date: Wed, 05 Sep 2001 09:56:30 -0400
From: "Shawn C. Masters" <scm@imstumped.com>
To: Dominikus Scherkl <Dominikus.Scherkl@biodata.com>
cc: "openPGP e-Mail (E-Mail)" <ietf-openpgp@imc.org>
Subject: Re: AW: Reasons to include ECC to our charter
In-Reply-To: <100722F3C53A484B8CF1F14B4F062E93157074@fra1d001.biodata.org>
Message-ID: <Pine.LNX.4.30.0109050944550.21926-100000@fs.imstumped.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Wed, 5 Sep 2001, Dominikus Scherkl wrote:

>
> > ECC does *not* affect the speed of large file encryption.
> Agreed. But that's not the point.
> The most convincing argument for including ECC (to me) is
> having another alternative, an algorithm depending on a
> completely different problem, independent to integer
> factorization and discrete logarithms.
>

	Actually it isn't independent of either integer factorization or
the discrete log problem.  All of the ECC systems I've seen are actually
discrete log over the elleptic curve derived number field rather than the
one produced by "mod n".  The only real difference is that no one knows
how to apply a number field sieve to the ECC.  Well more accuratly, no one
knows if there exists a definition of "smoothness", thus the most
effecient factoring algorithm to date is Pollard's Rho which sets the
equivalent key strength to a much smaller multiple of RSA before Number
field seives.

	So you get a faster PK encryption, that uses less memory, but only
because no one has figured out how to apply our best factoring algorithms
to it.  This may not be possible, or may just not be known.  Of course
, the next major advance in factoring may not even be a seive, or
require smoothness.  That is why many people only recommend ECC for small
devices, but these are all if's.

	73,
		Shawn