Public-key cryptography has been widely accepted as the method in which data is encrypted, using algorithms such as the widely known and popularly used RSA algorithm. However, management of the public-key and its storage is an on-going issue. To avoid these problems the symmetric-key approach can be
Choosing key sizes for cryptography
β Scribed by Alexander W. Dent
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 149 KB
- Volume
- 15
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
β¦ Synopsis
After making the decision to use public-key cryptography, an organisation still has to make many important decisions before a practical system can be implemented. One of the more difficult challenges is to decide the length of the keys which are to be used within the system: longer keys provide more security but mean that the cryptographic operation will take more time to complete. The most common solution is to take advice from information security standards. This article will investigate the methodology that is used produce these standards and their meaning for an organisation who wishes to implement public-key cryptography.
π SIMILAR VOLUMES
We use the dynamical beha¨ior of a nonlinear fiber ring resonator and the switching capability of a nonlinear fiber coupler to produce a sequence of pulses, with polarization states changing pseudorandomly between two ¨alues, to be used as a key in quantum cryptography. The experimental setup is pro