Cryptography > Asymmetric Cryptography

Name Full Name Trapdoor Function Computational Complexity Private Key Public Key Message Hash
RSA Rivest, Shamir, Adelmen prime factorization,
difficulty of factorization
δ
δ ∈ ℤ+
(μ, ε)
μ, ε ∈ ℤ+
m
m ∈ ℤ+
ECC Elliptic Curve Cryptography number of times k
k ∈ ℤ+
(x, y)
x, y ∈ ℤ+
e or z
e, z ∈ ℤ+
RSA 2048-bit key
RSA 3072-bit
RSA 4096-bit

Elliptic-Curve Cryptography (ECC)
   P-256
   P-384
   P-521
   P-256K