What key size should be used ?

Answer Posted / ramkumar

The key size that should be used in a particular
application of cryptography depends on two things. First of
all, the value of the key is an important consideration.
Secondly, the actual key size depends on what cryptographic
algorithm is being used.

Due to the rapid development of new technology and
cryptanalytic methods, the correct key size for a
particular application is continuously changing. For this
reason, RSA Laboratories refers to its web site
http://www.rsa.com/rsalabs/ for updated recommendations.
The table below contains key size limits and
recommendations from different sources for block ciphers,
the RSA system, the elliptic curve system, and DSA.

Some comments:

Export grade or nominal grade gives little real protection;
the key sizes are the limits specified in the Wassenaar
Arrangement (see Question 6.5.3).


"Traditional recommendations" are recommendations such as
those given in earlier versions of this FAQ. Such
recommendations are normally based on the traditional
approach of counting MIPS-years for the best available key
breaking algorithms. There are several reasons to call this
approach in question. For example, an algorithm with
massive memory requirements is probably not equivalent to
an algorithm with low memory requirements.


The last rows in the table give lower bounds for commercial
applications as suggested by Lenstra and Verheul [LV00].
The first of these rows shows recommended key sizes of
today, while the second row gives estimated lower bounds
for 2010. The bounds are based on the assumption that DES
was sufficiently secure until 1982 along with several
hypotheses, which are all extrapolations in the spirit of
Moore's Law (the computational power of a chip doubles
every 18 months). One questionable assumption they make is
that computers and memory will be able for free. It seems
that this assumption is not realistic for key breaking
algorithms with large memory requirements. One such
algorithm is the General Number Field Sieve used in RSA key
breaking efforts.

------------------------------------------------------------
--------------------
Block Cipher
RSA
Elliptic Curve
DSA
Export Grade 56 512 112 512/112
Traditional
recommendations
80 1024 160 1024/160
112 2048 224 2048/224
Lenstra/Verheul 2000
70 952 132 952/125
Lenstra/Verheul 2010
78 1369 146/160 1369/138

------------------------------------------------------------
--------------------


Table 2. Minimal key lengths in bits for different grades.

Notes. The RSA key size refers to the size of the modulus.
The Elliptic Curve key size refers to the minimum order of
the base point on the elliptic curve; this order should be
slightly smaller than the field size. The DSA key sizes
refer to the size of the modulus and the minimum size of a
large subgroup, respectively (the size of the subgroup is
often considerably larger in applications). In the last row
there are two values for elliptic curve cryptosystems; the
choice of key size should depend on whether any significant
cryptanalytic progress in this field is expected or not.

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

3125


What is key management ?

1796


What is probabilistic encryption?

598


What Is Encryption?

577


How is an s-box value of AES can be modified? How is it done?

1456






How to remove the Kryptel (Silver Key) icon from the desktop?

1675


How to I prevent other users from using Kryptel (Silver Key)?

1613


What is private key cryptography and how we compare it with public key cryptography?

1450


What is public key encryption?

1544


What is an encryption "key" and what is the importance of key length?

1577


Actual role of cryptography is data security .Explain with real world example?

1466


What is the mceliece cryptosystem?

559


How do certifying authorities store their private keys ?

2064


What are the ecb and cbc modes?

580


Do digital signatures help detect altered documents and transmission errors?

681