Map
Index
Random
Help
Topics
th

QuoteRef: lensAK9_2001




Topic:
security leaks and weaknesses
Topic:
encryption
Topic:
password protection

Reference

Lenstra, A.K., Verheul, E.R., "Selecting cryptographic key sizes", Journal of Cryptology, 14, 4, pp. 255-293, September, 2001. Google

Notes

page numbers from pdf file, 32 pp.

Quotations
1 ;;Quote: guidelines for selecting the cryptographic key size; acceptable security for commercial applications
1 ;;Quote: nearly all cryptographic failures due to protocol or password deficiences; e.g., using nine random characters to protect PGP's private keys
21 ;;Quote: table of cryptographic key sizes; e.g., in 2020, hash functions will need 172 bits to be as secure as DES in 1982

Related Topics up

Topic: security leaks and weaknesses (67 items)
Topic: encryption (45 items)
Topic: password protection (44 items)

Collected barberCB 3/04
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.