Selecting Cryptographic Key Sizes

被引:0
|
作者
Arjen K. Lenstra
Eric R. Verheul
机构
[1] Citibank,
[2] N.A.,undefined
[3] 1 North Gate Road,undefined
[4] Mendham,undefined
[5] NJ 07945-3104,undefined
[6] U.S.A. arjen.lenstra@citicorp.com and Technische Universiteit Eindhoven,undefined
[7] PricewaterhouseCoopers,undefined
[8] GRMS Crypto Group,undefined
[9] Goudsbloemstraat 14,undefined
[10] 5644 KE Eindhoven,undefined
[11] The Netherlands eric.verheul@[nl.pwcglobal.com,undefined
[12] pobox.com],undefined
来源
Journal of Cryptology | 2001年 / 14卷
关键词
Key words. Symmetric key length, Public key length, RSA, ElGamal, Elliptic curve cryptography, Moore's law.;
D O I
暂无
中图分类号
学科分类号
摘要
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter settings, combined with existing data points about the cryptosystems.
引用
收藏
页码:255 / 293
页数:38
相关论文
共 50 条
  • [1] Selecting cryptographic key sizes
    Lenstra, AK
    Verheul, ER
    JOURNAL OF CRYPTOLOGY, 2001, 14 (04) : 255 - 293
  • [2] Selecting cryptographic key sizes - Extended abstract
    Lenstra, AK
    Verheul, ER
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 446 - 465
  • [3] Cryptographic key recovery
    AlSalqan, YY
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 34 - 37
  • [4] Selecting grid and timestep sizes
    1600, Publ by Soc of Petroleum Engineers of AIME, Richardson, TX, USA (13):
  • [5] Cryptographic key management for the masses
    Potter, Bruce
    Network Security, 2006, 2006 (12) : 13 - 14
  • [6] On optimal cryptographic key derivation
    Chan, Aldar C. -F.
    THEORETICAL COMPUTER SCIENCE, 2013, 489 : 21 - 36
  • [7] Key Expansion in Cryptographic Systems
    Chitu, Sorin
    Vasile, Daniel Ciprian
    Tramandan, Ionut Daniel
    Svasta, Paul
    2020 IEEE 26TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2020), 2020, : 202 - 205
  • [8] Cryptographic Key Protection in a Cryptoprocessor
    Rajitha, N.
    Sridevi, R.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 271 - 275
  • [9] Attacking Cryptographic Key Exchange with Precomputation
    Boneh, Dan
    COMMUNICATIONS OF THE ACM, 2019, 62 (01) : 105 - 105
  • [10] Cryptographic Key Regeneration from Speech
    Inthavisas, K.
    Sungprasert, N.
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 933 - 940