Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

5
  • 2
    Also another improvement is the speed of the operations that is faster on ECC than on RSA. Commented Apr 28, 2020 at 20:22
  • 17
    It should be mentionned many cryptographers are suspicious that NIST curves used in ECDSA might be designed as backdoors. See git.libssh.org/projects/libssh.git/tree/doc/… for a summary of the concerns. Commented Apr 29, 2020 at 9:57
  • 4
    @alci that's a good point. It seems better to use Ed25519 (EdDSA, Curve25519), created as alternative due to NIST-related concerns. Commented Nov 13, 2021 at 14:57
  • 5
    You might want to consider secp256k1. You can think of bitcoin as a massive bug bounty for secp256k1. If a bad actor were to find a weakness in secp256k1 and exploit it, they could use it to steal other peoples' bitcoin. At $20,000 USD / btc, this would be very lucrative. But, to date, nobody has found a bug and 'claimed the bounty'. Commented Sep 9, 2022 at 22:31
  • 1
    100,000 $/BTC, still no issue ;) Commented Nov 23, 2024 at 6:08