𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Choosing key sizes for cryptography

✍ Scribed by Alexander W. Dent


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
149 KB
Volume
15
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.

✦ Synopsis


After making the decision to use public-key cryptography, an organisation still has to make many important decisions before a practical system can be implemented. One of the more difficult challenges is to decide the length of the keys which are to be used within the system: longer keys provide more security but mean that the cryptographic operation will take more time to complete. The most common solution is to take advice from information security standards. This article will investigate the methodology that is used produce these standards and their meaning for an organisation who wishes to implement public-key cryptography.


πŸ“œ SIMILAR VOLUMES


Symmetric-key block cipher for image and
✍ JosΓ© J. Amador; Robert W. Green πŸ“‚ Article πŸ“… 2005 πŸ› John Wiley and Sons 🌐 English βš– 472 KB

Public-key cryptography has been widely accepted as the method in which data is encrypted, using algorithms such as the widely known and popularly used RSA algorithm. However, management of the public-key and its storage is an on-going issue. To avoid these problems the symmetric-key approach can be

A setup for quantum cryptography using a
✍ Rubens Viana Ramos; Rui Fragassi Souza πŸ“‚ Article πŸ“… 2000 πŸ› John Wiley and Sons 🌐 English βš– 121 KB

We use the dynamical beha¨ior of a nonlinear fiber ring resonator and the switching capability of a nonlinear fiber coupler to produce a sequence of pulses, with polarization states changing pseudorandomly between two ¨alues, to be used as a key in quantum cryptography. The experimental setup is pro