Podcast
Root Causes 478: Should We All Switch from RSA to ECC?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
March 17, 2025
RSA is under attack. Even without the quantum threat, we face the possibility of smart new exploits reducing the viable RSA key space and rendering it unsafe. In this episode we discuss the merits of choosing ECC over RSA as soon as today.
Podcast Transcript
Lightly edited for flow and brevity.
ECC as well. Same timeframe. But to answer the question - this is the way I answered it to the few people who asked the question, was it is actually at the point where it really doesn't matter what you do now in terms of the key sizes. So I would say the best thing to start thinking between now and 2030 when all the classic algorithms are deprecated, RSA and ECC, you really should start to think yourself, if I'm a consumer of a publicly trusted certificate, or if I am setting the certificate profile of a private Certificate Authority - those are the two cases we're really talking about here. In both of those cases, if you're given the option of RSA or ECC as a cryptographic algorithm, me personally, if my systems work with ECC, I will choose elliptic curve cryptography as my algorithm over RSA. It's because of exactly what we just talked about, not the least of which is the statement by Michele Mosca, which we should all take very seriously.
Then the wider question, Tim, and I'll end it with this. I think this is the question we're asking on this podcast is, as a CA industry, and especially the company we work for directly, Sectigo, should we start to consider both promoting ECC over RSA, and should we start declaring RSA like, well, you can still get it issued. It still works. It's probably still secure, but there's more risk associated with it, and we fully recognize the fact that there's a lot of systems that probably are hard coded to work only with RSA at this point.
So that's a consideration. But on the other hand, there's a lot of you who are running modern web servers, for example, that can run either. If you were given the choice, you should probably run ECC. That's just a thought, Tim.
So I heard an interesting story just yesterday. Couple fish are swimming along, and couple young fish are swimming along, and an older, wiser fish is coming the other direction. The older, wiser fish says, hey, kids, how's the water? They say, fine, and they swim away. When they're past the older, wiser fish, one of the fish says, the other one, he goes, what's water. I think that's the situation. We don't even know we're assuming it, because it's just so basic. It's like air. It's like fish in water, and nobody even thinks about it. Nobody even questions it.
Number one, simply said. Then I think we can talk about public trust and break that down as well. So for people who don't care at all. Don't even know what RSA and ECC is. Here's one question. Question number one, should CAs start to issue ECC by default? Period. Out of the roots. Like that's just a question to be asked. Then number two, for those of you who are large customers, who really care about the certificate profile and the fact that you can get different kinds of certificates from CAs. Those of you who know that you've been having RSA issued and you don't have anything hard coded against it, there's probably not a lot of cost for you to make a telephone call to your CA and say, hey, I've got this contract with you where my certs come out of a certain root. Can I have them out of an ECC root instead going forward? And that's not an expensive phone call. So I think the scenarios where we should land on ECC are probably net new CA systems, CAs just in default mode what are we issuing to just the general public and then for those of us who have very specific contracts that name a cryptographic algorithm in their profiles, maybe those people need to be educated on maybe switch over to ECC, because hopefully, for most of you, it's not that be big of a deal.

