ECC PGP or PGP ECC in mobile encryption technologies have evolved ever since their inception to meet the requirements of encrypted mobile phone users. Ever growing awareness of encrypted mobile communication among the users is putting tremendous pressure on the industry forcing them to provide sophisticated technology in encrypted cell phone devices.
Pretty Good Privacy (PGP) is evolving as well for making the encrypted phones more secure. PGP has been using encryption algorithms like RSA by default with large PGP key sizes for a long time now. More specifically, AES 256 is currently being used for providing symmetric encryption in PGP mobile phones, and RSA 4096 for providing asymmetric encryption in PGP mobiles.
However, you have options of using encryption algorithms other than these default encryption algorithms. Elliptic Curve Cryptography can be used in BES version 10 +. ECC or Elliptic Curve cryptography – a relatively newer branch of mathematics – uses smaller keys compared to other algorithms like RSA.
This seemingly evolved method of encryption provides similar kind of strength and security to RSA according to some PGP providers. Unfortunately, that’s not the case one two counts. First, there is nothing new or “evolved” about ECC and this technology’s been well heard of now. A number of different kinds of service providers and websites on the internet already use ECC in order to secure communications.
Secondly, PGP providers that are proponents of ECC boast that the rationale for using ECC instead of other RSA based algorithms lies in its key size and security. PGP service providers that use ECC want to make people wrongly believe that an elliptic curve group with a much smaller key not only reduces the transmission and storage requirements, but also affords a similar security level promised by an RSA algorithm having larger modulus and comparatively large key. ECC has also been endorsed by the US National Institute of Standards and Technology in its recommended algorithms for key exchange and supported by NSA. Well, it’s a seriously dubious distinction and says all about the reliability and safety of ECC.
It’s a proven fact that ECC curves are not considered to be safe by any standard. ECDLP (Elliptic Curve Discrete Logarithm Problem) is a problem of finding the secret key of ECC user using the public key of the user. But the gap between ECC security and ECDLP makes it unsafe. The complete list of problems with the safety of ECC curves can be found at safecurves.cr.yp.to