Re: Reasons to include ECC to our charter

bmoeller@hrzpub.tu-darmstadt.de (Bodo Moeller) Mon, 10 September 2001 19:41 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28657 for <openpgp-archive@odin.ietf.org>; Mon, 10 Sep 2001 15:41:49 -0400 (EDT)
Received: by above.proper.com (8.11.6/8.11.3) id f8AJOdm04885 for ietf-openpgp-bks; Mon, 10 Sep 2001 12:24:39 -0700 (PDT)
Received: from cdc-info.cdc.informatik.tu-darmstadt.de (cdc-info.cdc.informatik.tu-darmstadt.de [130.83.23.100]) by above.proper.com (8.11.6/8.11.3) with ESMTP id f8AJOcD04880 for <ietf-openpgp@imc.org>; Mon, 10 Sep 2001 12:24:38 -0700 (PDT)
Received: from localhost (cdc-info [130.83.23.100]) by cdc-info.cdc.informatik.tu-darmstadt.de (Postfix) with SMTP id 301CE2C93; Mon, 10 Sep 2001 21:24:39 +0200 (MET DST)
Received: id <m15gWcw-000Qe5C@epsilon>; Mon, 10 Sep 2001 21:21:50 +0200 (CEST)
Message-Id: <m15gWcw-000Qe5C@epsilon>
Date: Mon, 10 Sep 2001 21:21:50 +0200
From: bmoeller@hrzpub.tu-darmstadt.de
Reply-To: moeller@cdc.informatik.tu-darmstadt.de
To: ietf-openpgp@imc.org
Cc: Jon Callas <jon@callas.org>, vedaal <vedaal@hotmail.com>
Subject: Re: Reasons to include ECC to our charter
In-Reply-To: <p0510030eb7bb0795e734@[192.168.1.180]>
References: <OE63iEKAajHVBAIWPxg00004ca0@hotmail.com> <p0510030eb7bb0795e734@[192.168.1.180]>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Jon Callas <jon@callas.org>:

[...]
> ECC does *not* affect the speed of large file encryption. Actually, it's
> the opposite; it matters most for *small* files.

You cannot expect elliptic curve based encryption to be faster than
RSA encryption.  Signing and decryption may be faster than for RSA or
DSA/ElGamal (but not necessarily when the platform is a PC or
workstations and if the modular exponentiation implementation is
reasonably well optimized), but it is hard to beat RSA public key
operations with small exponents.