Cryptographic Key Length Recommendation

In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.

This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.

Choose a Method
1   Reference for the comparison
You can enter the year until when your system should be protected and see the corresponding key sizes or you can enter a key/hash/group size and see until when you would be protected.
2
Method Date Symmetric Asymmetric
Discrete Logarithm
Key Group
Elliptic Curve Hash
[1] Lenstra / Verheul (?) 2014 81
1562 1216
143 1562
152 162
[2] Lenstra Updated (?) 2014 78
1218 1309
155 1218
155 155
[3] ECRYPT II 2011 - 2015 80 1248
160 1248
160 160
[4] NIST 2011 - 2030 112 2048
224 2048
224 224
[5] ANSSI 2010 - 2020 100 2048
200 2048
200 200
[6] NSA - - -
- -
- -
[7] RFC3766 (?) - - -
- -
- -
[8] BSI (signature only) 2013 - 2015 - 1976
224 2048
224 224
All key sizes are provided in bits. These are the minimal sizes for security.
© 2014 BlueKrypt - v 27.8 - October 21, 2013
Author: Damien Giry
Approved by Prof. Jean-Jacques Quisquater
Contact:
I would like to thank Prof. Arjen K. Lenstra for his kind authorization and comments.
Surveys of laws and regulations on cryptology: Crypto Law Survey / Digital Signature Law Survey.
Bibliography[1] Selecting Cryptographic Key Sizes, Arjen K. Lenstra and Eric R. Verheul, PKC2000: p. 446-465, 01/2000.
[2] Handbook of Information Security, Arjen K. Lenstra, 06/2004.
[3] Yearly Report on Algorithms and Keysizes (2012), D.SPA.20 Rev. 1.0, ICT-2007-216676 ECRYPT II, 09/2012.
[4] Recommendation for Key Management, Special Publication 800-57 Part 1 Rev. 3, NIST, 07/2012.
[5] Mécanismes cryptographiques - Règles et recommandations, Rev. 1.20, ANSSI , 01/2010.
[6] Fact Sheet Suite B Cryptography, NSA, 05/2013.
[7] Determining Strengths for Public Keys Used for Exchanging Symmetric Keys, RFC 3766, H. Orman and P. Hoffman, 04/2004.
[8] Algorithms for Qualified Electronic Signatures, BNetzA, BSI, 02/2013 updated with BSI Draft, 10/2013.
Privacy Policy (P3P)  |  Disclaimer / Copyright  |  Release Notes