4.6 Ellipitic Curve Systems
Faced with the growing threat of hackers, many companies have begun using Elliptic Curve Cryptography. A user on a system must input a large block of data in sequence, synchronized with the system. This cannot be done by hand - the timings must be perfect. Elliptic Curve Cryptography is popular due to the large amount of CPU power needed to force crack it.
However, as with all cryptography, even this system can be broken given enough time and CPU cycles. Agents can use the Decipher software tool to force crack one of these systems, but a fast CPU rig will be required.