Topic: security leaks and weaknesses
Topic: encryption
Topic: password protection
| |
Reference
Lenstra, A.K., Verheul, E.R.,
"Selecting cryptographic key sizes",
Journal of Cryptology, 14, 4, pp. 255-293, September, 2001.
Google
Notes
page numbers from pdf file, 32 pp.
Quotations
1 ;;Quote: guidelines for selecting the cryptographic key size; acceptable security for commercial applications
| 1 ;;Quote: nearly all cryptographic failures due to protocol or password deficiences; e.g., using nine random characters to protect PGP's private keys
| 21 ;;Quote: table of cryptographic key sizes; e.g., in 2020, hash functions will need 172 bits to be as secure as DES in 1982
|
Related Topics
Topic: security leaks and weaknesses (67 items)
Topic: encryption (45 items)
Topic: password protection (44 items)
|