Selecting cryptographic key sizes

被引:360
|
作者
Lenstra, AK
Verheul, ER
机构
[1] Citibank NA, Mendham, NJ 07945 USA
[2] PricewaterhouseCoopers, GRMS Crypto Grp, NL-5644 KE Eindhoven, Netherlands
关键词
symmetric key length; public key length; RSA; ElGamal; elliptic curve cryptography; Moore's law;
D O I
10.1007/s00145-001-0009-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter settings, combined with existing data points about the cryptosystems.
引用
收藏
页码:255 / 293
页数:39
相关论文
共 50 条
  • [1] Selecting Cryptographic Key Sizes
    Arjen K. Lenstra
    Eric R. Verheul
    Journal of Cryptology, 2001, 14 : 255 - 293
  • [2] Selecting cryptographic key sizes - Extended abstract
    Lenstra, AK
    Verheul, ER
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 446 - 465
  • [3] Cryptographic key recovery
    AlSalqan, YY
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 34 - 37
  • [4] Selecting grid and timestep sizes
    1600, Publ by Soc of Petroleum Engineers of AIME, Richardson, TX, USA (13):
  • [5] Cryptographic key management for the masses
    Potter, Bruce
    Network Security, 2006, 2006 (12) : 13 - 14
  • [6] On optimal cryptographic key derivation
    Chan, Aldar C. -F.
    THEORETICAL COMPUTER SCIENCE, 2013, 489 : 21 - 36
  • [7] Key Expansion in Cryptographic Systems
    Chitu, Sorin
    Vasile, Daniel Ciprian
    Tramandan, Ionut Daniel
    Svasta, Paul
    2020 IEEE 26TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2020), 2020, : 202 - 205
  • [8] Cryptographic Key Protection in a Cryptoprocessor
    Rajitha, N.
    Sridevi, R.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 271 - 275
  • [9] Attacking Cryptographic Key Exchange with Precomputation
    Boneh, Dan
    COMMUNICATIONS OF THE ACM, 2019, 62 (01) : 105 - 105
  • [10] Cryptographic Key Regeneration from Speech
    Inthavisas, K.
    Sungprasert, N.
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 933 - 940