2000
DOI: 10.1007/978-3-540-46588-1_30
|View full text |Cite
|
Sign up to set email alerts
|

Selecting Cryptographic Key Sizes

Abstract: Abstract. In this article we give guidelines for the determination of cryptographic key sizes. Our recommendations are based on a set of explicitly formulated hypotheses, combined with existing data points about the cryptosystems. This article is an abbreviated version of [15].

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
122
0
2

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 190 publications
(126 citation statements)
references
References 14 publications
0
122
0
2
Order By: Relevance
“…From [5], the estimated key size used in ECC is 28 bytes and a signature size of 56 bytes. The security strength of 224-bit key in ECC is equivalent to that of 2048-bit key in RSA cryptosystem [10]. In [9], Lu et al measured the computation times of the multiplication, pairing and exponentiation operations using 3 GHz processor and 512 MB RAM.…”
Section: B Computation Overheadmentioning
confidence: 99%
“…From [5], the estimated key size used in ECC is 28 bytes and a signature size of 56 bytes. The security strength of 224-bit key in ECC is equivalent to that of 2048-bit key in RSA cryptosystem [10]. In [9], Lu et al measured the computation times of the multiplication, pairing and exponentiation operations using 3 GHz processor and 512 MB RAM.…”
Section: B Computation Overheadmentioning
confidence: 99%
“…( (6) where rand() is a function that generates a random number ∊ (0,1) drawn from a random distribution (uniform in our case). The randomization term computes a random step-size in a way that ri does not cross the boundary of the search domain.…”
Section: Movement Equationmentioning
confidence: 99%
“…In view of this, Lenstra and Verheul [6] suggested secure symmetric and asymmetric key sizes by year which can be found in Table I. The exact algorithms often incur huge memory and runtime expenses as we have seen in many such algorithms applied to various NP-Hard problems.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, estimating the rate of future cryptanalytical successes is difficult, see e.g. Lenstra and Verheul [26]. Prudent designers use safety margins to allow for unexpected breakthroughs; however, there is often resistance to replace widely deployed standards which were not broken yet, 'just' since the safety margins were eroded.…”
Section: Introductionmentioning
confidence: 99%