Selecting cryptographic key sizes

被引:360
|
作者
Lenstra, AK
Verheul, ER
机构
[1] Citibank NA, Mendham, NJ 07945 USA
[2] PricewaterhouseCoopers, GRMS Crypto Grp, NL-5644 KE Eindhoven, Netherlands
关键词
symmetric key length; public key length; RSA; ElGamal; elliptic curve cryptography; Moore's law;
D O I
10.1007/s00145-001-0009-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter settings, combined with existing data points about the cryptosystems.
引用
收藏
页码:255 / 293
页数:39
相关论文
共 50 条
  • [31] SELECTING A SAMPLE OF KEY PRECINCTS
    ROSHWALB, I
    IEEE SPECTRUM, 1968, 5 (09) : 45 - &
  • [32] Cryptographic key exchange based on locationing information
    Naik, Piyush
    Ravichandran, Karthikeyan
    Sivalingam, Krishna M.
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 15 - 35
  • [33] Practical aspects of quantum cryptographic key distribution
    Zbinden, H
    Gisin, N
    Huttner, B
    Muller, A
    Tittel, W
    JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 207 - 220
  • [34] A method for cryptographic key generation from fingerprints
    Imamverdiev Ya.N.
    Sukhostat L.V.
    Automatic Control and Computer Sciences, 2012, 46 (02) : 66 - 75
  • [35] Cryptographic key generation using handwritten signature
    Freire-Santos, M.
    Fierrez-Aguilar, J.
    Ortega-Garcia, J.
    BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION III, 2006, 6202
  • [36] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +
  • [37] Implementation of a quantum cryptographic key distribution system
    Cheung, WN
    Edward, PJ
    Ganeshkumar, G
    Barbopoulos, LO
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B12 - B16
  • [38] Key substitution in the symbolic analysis of cryptographic protocols
    Chevalier, Yannick
    Kourjieh, Mounira
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 121 - 132
  • [39] Cryptographic Key Generation Using ECG Signal
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1024 - 1031
  • [40] No Random, No Ransom: A Key to Stop Cryptographic Ransomware
    Genc, Ziya Alper
    Lenzini, Gabriele
    Ryan, Peter Y. A.
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 234 - 255