manpagez: man pages & more
info gnutls
Home | html | info | man
[ < ] [ > ]   [ << ] [ Up ] [ >> ]         [Top] [Contents] [Index] [ ? ]

3.7 Selecting Cryptographic Key Sizes

In TLS, since a lot of algorithms are involved, it is not easy to set a consistent security level. For this reason this section will present some correspondance between key sizes of symmetric algorithms and public key algorithms based on the most conservative values of [SELKEY] (see section Bibliography). Those can be used to generate certificates with appropriate key sizes as well as parameters for Diffie-Hellman and SRP authentication.

YearSymmetric key sizeRSA key size, DH and SRP prime sizeECC key size
198256417105
198861566114
2002721028139
2015821613173
2028922362210
20401013214244
20501094047272

The first column provides an estimation of the year until these parameters are considered safe and the rest of the columns list the parameters for the various algorithms.

Note however that the values suggested here are nothing more than an educated guess that is valid today. There are no guarrantees that an algorithm will remain unbreakable or that these values will remain constant in time. There could be scientific breakthroughs that cannot be predicted or total failure of the current public key systems by quantum computers. On the other hand though the cryptosystems used in TLS are selected in a conservative way and such catastrophic breakthroughs or failures are believed to be unlikely.

NIST publication SP 800-57 [NISTSP80057] (see section Bibliography) contains a similar table that extends beyond the key sizes given above.

Bits of securitySymmetric key algorithmsRSA key size, DSA, DH and SRP prime sizeECC key size
802TDEA1024160-223
1123DES2048224-255
128AES-1283072256-383
192AES-1927680384-511
256AES-25615360512+

The recommendations are fairly consistent.


[ < ] [ > ]   [ << ] [ Up ] [ >> ]         [Top] [Contents] [Index] [ ? ]
© manpagez.com 2000-2025
Individual documents may contain additional copyright information.