<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="https://purl.org/dc/elements/1.1/" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:foaf="https://xmlns.com/foaf/0.1/" xmlns:og="https://ogp.me/ns#" xmlns:rdfs="https://www.w3.org/2000/01/rdf-schema#" xmlns:schema="https://schema.org/" xmlns:sioc="https://rdfs.org/sioc/ns#" xmlns:sioct="https://rdfs.org/sioc/types#" xmlns:skos="https://www.w3.org/2004/02/skos/core#" xmlns:xsd="https://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/tag/openssh">
  <channel>
    <title>OpenSSH</title>
    <link>https://www.linuxjournal.com/tag/openssh</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Elliptic Curve Cryptography</title>
  <link>https://www.linuxjournal.com/content/elliptic-curve-cryptography</link>
  <description>  &lt;div data-history-node-id="1084447" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/11264f5.jpg" width="480" height="480" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/joe-hendrix" lang="" about="https://www.linuxjournal.com/users/joe-hendrix" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Joe Hendrix&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
When it comes to public key cryptography, most systems today are still stuck in
the 1970s. On December 14, 1977, two events occurred that would change the
world: Paramount Pictures released &lt;em&gt;Saturday Night
Fever&lt;/em&gt;, and MIT filed the
patent for RSA. Just as &lt;em&gt;Saturday Night Fever&lt;/em&gt; helped popularize disco through its
choreography and soundtrack, RSA helped popularize cryptography by allowing two
parties to communicate securely without a shared secret.
&lt;/p&gt;

&lt;p&gt;
Public key techniques, such as RSA, have revolutionized cryptography and form the
basis for Web site encryption via SSL/TLS, server administration via SSH, secure
e-mail and IP encryption (IPsec). They do this by splitting the shared secret
key used in traditional cryptography into two parts: a public key for
identifying
oneself and a secret key for proving an identity electronically. Although the
popularity of disco has waned, most Web sites today that use encryption still
are using RSA.
&lt;/p&gt;

&lt;p&gt;
Since the 1970s, newer techniques have been developed that offer better security
with smaller key sizes than RSA. One major breakthrough is the development of
cryptography based on the mathematical theory of elliptic curves, called ECC 
(Elliptic Curve Cryptography). Although ECC has a reputation for being quite
complex, it has been integrated into popular open-source cryptographic software
including OpenSSH and OpenSSL, and it's not inherently any more difficult to use than
RSA. In this article, I describe ECC and show how it can be used with recent
versions of OpenSSH and OpenSSL.
&lt;/p&gt;

&lt;p&gt;
Not all cryptographic algorithms are equal. For a fixed key or output length,
one algorithm may provide much more security than another. This is particularly
true when comparing different types of algorithms, such as comparing public and
symmetric key algorithms. To help make sense of this, the National Institute of
Standards and Technology (NIST) reviews the academic literature on attacking
cryptographic algorithms and makes recommendations on the actual security provided
by different algorithms (see Table 1 from 2011).
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/elliptic-curve-cryptography" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 08 Apr 2013 15:10:49 +0000</pubDate>
    <dc:creator>Joe Hendrix</dc:creator>
    <guid isPermaLink="false">1084447 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
