Selecting Cryptographic Key Sizes

被引:0
|
作者
Arjen K. Lenstra
Eric R. Verheul
机构
[1] Citibank,
[2] N.A.,undefined
[3] 1 North Gate Road,undefined
[4] Mendham,undefined
[5] NJ 07945-3104,undefined
[6] U.S.A. arjen.lenstra@citicorp.com and Technische Universiteit Eindhoven,undefined
[7] PricewaterhouseCoopers,undefined
[8] GRMS Crypto Group,undefined
[9] Goudsbloemstraat 14,undefined
[10] 5644 KE Eindhoven,undefined
[11] The Netherlands eric.verheul@[nl.pwcglobal.com,undefined
[12] pobox.com],undefined
来源
Journal of Cryptology | 2001年 / 14卷
关键词
Key words. Symmetric key length, Public key length, RSA, ElGamal, Elliptic curve cryptography, Moore's law.;
D O I
暂无
中图分类号
学科分类号
摘要
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter settings, combined with existing data points about the cryptosystems.
引用
收藏
页码:255 / 293
页数:38
相关论文
共 50 条
  • [41] Improvement over Public Key Cryptographic Algorithm
    Garg, Deepak
    Verma, Seema
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 734 - 739
  • [42] On the cryptographic key secrecy of the strengthened Yahalom protocol
    Backes, Michael
    Pfitzmann, Birgit
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 233 - +
  • [43] Practical Aspects of Quantum Cryptographic Key Distribution
    H. Zbinden
    N. Gisin
    B. Huttner
    A. Muller
    W. Tittel
    Journal of Cryptology, 2000, 13 : 207 - 220
  • [44] 109-bit cryptographic key cracked
    不详
    IEEE CONCURRENCY, 2000, 8 (02): : 7 - 7
  • [45] Design of a variable key length cryptographic processor
    Bharathwaj, SV
    Kishore, LN
    Arulalan, MR
    Proceedings of the 4th WSEAS International Conference on Applications of Electrical Engineering, 2005, : 231 - 236
  • [46] An Approach to Cryptographic Key Exchange Using Fingerprint
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
  • [47] SIKM - a smart cryptographic key management framework
    Chaeikar, Saman Shojae
    Ahmadi, Ali
    Karamizadeh, Sasan
    Chaeikar, Nakisa Shoja
    OPEN COMPUTER SCIENCE, 2022, 12 (01): : 17 - 26
  • [48] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
  • [49] Evaluating True Cryptographic Key Space Size
    Carlson, Albert
    Gang, Garret
    Gang, Torsten
    Ghosh, Bhaskar
    Dutta, Indira Kalyan
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 243 - 249
  • [50] Evolutionary public-key cryptographic circuits
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    NEW FRONTIERS IN APPLIED ARTIFICIAL INTELLIGENCE, 2008, 5027 : 551 - +