Map
Index
Random
Help
th

Quote: guidelines for selecting the cryptographic key size; acceptable security for commercial applications

QuoteRef: lensAK9_2001 , p. 1



Topic:
security leaks and weaknesses
Topic:
encryption

Quotation Skeleton

The effectiveness of [cryptographic] protection depends on a … of these issues is equally important: if a … a password is poorly selected or protected, then … for the determination of cryptographic key sizes. … if current trends persist, then following our guidelines … As far as we know this article is … generally accepted cryptosystems. … [p. 3] from a computational point of view the … [i.e., equivalent Mips Years to break the cryptosystem].   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (67 items)
Topic: encryption (45 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.