Ĩesky | english
Suggested Key Sizes
NIST SP 800-57 is the NIST's suggestion on what keylengths to use and expected timeframe that is will be useful.
Recommended algorithms and minimum key sizes |
||||
Algorithm security lifetimes |
Symmetric key algorithms |
FFC |
IFC |
ECC |
Through 2010 |
2TDEA* |
Min.: |
Min.: |
Min.: |
Through 2030 |
3TDEA |
Min.: |
Min.: |
Min.: |
Beyond 2030 |
AES-128 |
Min.: |
Min.: |
Min.: |
Explanations:
- FFC = Finite Field Cryptography; "L" = bit width of the public key, "N" = bit width of the private key.
- IFC = Integer Factorization Cryptography; "k" = module size (bits).
- ECC = Elliptic Curve Cryptography; "f" = minimal key size (bits).
- The guarantee of at least 80-bits of security for 2TDEA is based on the assumption that an attacker has at most 240 matched plaintext and ciphertext blocks. Encryption with the strength of 80 is disallowed after 2013. That strength is no more considered as the secure one.
- MAC = Message Authentication Code
- DSA = Digital Signature Algorithm
- D-H = Diffie-Hellmann (authors of the secure key exchange algorithm)
- RSA = Rivest, Shamir, Adleman (authors of the non-symmetrical encryption-decryption algorithm with public and private keys)
- ECDSA = Elliptic Curve Digital Signature Algorithm
- 2TDEA = 2-keys Triple Data Encryption Algorithm
- 3TDEA = 3-keys Triple Data Encryption Algorithm
- AES = Advanced Encryption Standard