Selecting cryptographic key sizes

被引:360
|
作者
Lenstra, AK
Verheul, ER
机构
[1] Citibank NA, Mendham, NJ 07945 USA
[2] PricewaterhouseCoopers, GRMS Crypto Grp, NL-5644 KE Eindhoven, Netherlands
关键词
symmetric key length; public key length; RSA; ElGamal; elliptic curve cryptography; Moore's law;
D O I
10.1007/s00145-001-0009-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter settings, combined with existing data points about the cryptosystems.
引用
收藏
页码:255 / 293
页数:39
相关论文
共 50 条
  • [41] Improvement over Public Key Cryptographic Algorithm
    Garg, Deepak
    Verma, Seema
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 734 - 739
  • [42] On the cryptographic key secrecy of the strengthened Yahalom protocol
    Backes, Michael
    Pfitzmann, Birgit
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 233 - +
  • [43] Practical Aspects of Quantum Cryptographic Key Distribution
    H. Zbinden
    N. Gisin
    B. Huttner
    A. Muller
    W. Tittel
    Journal of Cryptology, 2000, 13 : 207 - 220
  • [44] 109-bit cryptographic key cracked
    不详
    IEEE CONCURRENCY, 2000, 8 (02): : 7 - 7
  • [45] Design of a variable key length cryptographic processor
    Bharathwaj, SV
    Kishore, LN
    Arulalan, MR
    Proceedings of the 4th WSEAS International Conference on Applications of Electrical Engineering, 2005, : 231 - 236
  • [46] An Approach to Cryptographic Key Exchange Using Fingerprint
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
  • [47] SIKM - a smart cryptographic key management framework
    Chaeikar, Saman Shojae
    Ahmadi, Ali
    Karamizadeh, Sasan
    Chaeikar, Nakisa Shoja
    OPEN COMPUTER SCIENCE, 2022, 12 (01): : 17 - 26
  • [48] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
  • [49] Evaluating True Cryptographic Key Space Size
    Carlson, Albert
    Gang, Garret
    Gang, Torsten
    Ghosh, Bhaskar
    Dutta, Indira Kalyan
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 243 - 249
  • [50] Evolutionary public-key cryptographic circuits
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    NEW FRONTIERS IN APPLIED ARTIFICIAL INTELLIGENCE, 2008, 5027 : 551 - +