Selecting Cryptographic Key Sizes

被引:0
|
作者
Arjen K. Lenstra
Eric R. Verheul
机构
[1] Citibank,
[2] N.A.,undefined
[3] 1 North Gate Road,undefined
[4] Mendham,undefined
[5] NJ 07945-3104,undefined
[6] U.S.A. arjen.lenstra@citicorp.com and Technische Universiteit Eindhoven,undefined
[7] PricewaterhouseCoopers,undefined
[8] GRMS Crypto Group,undefined
[9] Goudsbloemstraat 14,undefined
[10] 5644 KE Eindhoven,undefined
[11] The Netherlands eric.verheul@[nl.pwcglobal.com,undefined
[12] pobox.com],undefined
来源
Journal of Cryptology | 2001年 / 14卷
关键词
Key words. Symmetric key length, Public key length, RSA, ElGamal, Elliptic curve cryptography, Moore's law.;
D O I
暂无
中图分类号
学科分类号
摘要
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter settings, combined with existing data points about the cryptosystems.
引用
收藏
页码:255 / 293
页数:38
相关论文
共 50 条
  • [31] SELECTING A SAMPLE OF KEY PRECINCTS
    ROSHWALB, I
    IEEE SPECTRUM, 1968, 5 (09) : 45 - &
  • [32] Cryptographic key exchange based on locationing information
    Naik, Piyush
    Ravichandran, Karthikeyan
    Sivalingam, Krishna M.
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 15 - 35
  • [33] Practical aspects of quantum cryptographic key distribution
    Zbinden, H
    Gisin, N
    Huttner, B
    Muller, A
    Tittel, W
    JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 207 - 220
  • [34] A method for cryptographic key generation from fingerprints
    Imamverdiev Ya.N.
    Sukhostat L.V.
    Automatic Control and Computer Sciences, 2012, 46 (02) : 66 - 75
  • [35] Cryptographic key generation using handwritten signature
    Freire-Santos, M.
    Fierrez-Aguilar, J.
    Ortega-Garcia, J.
    BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION III, 2006, 6202
  • [36] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +
  • [37] Implementation of a quantum cryptographic key distribution system
    Cheung, WN
    Edward, PJ
    Ganeshkumar, G
    Barbopoulos, LO
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B12 - B16
  • [38] Key substitution in the symbolic analysis of cryptographic protocols
    Chevalier, Yannick
    Kourjieh, Mounira
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 121 - 132
  • [39] Cryptographic Key Generation Using ECG Signal
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1024 - 1031
  • [40] No Random, No Ransom: A Key to Stop Cryptographic Ransomware
    Genc, Ziya Alper
    Lenzini, Gabriele
    Ryan, Peter Y. A.
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 234 - 255