On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
@article{Bos2009OnTS, title={On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography}, author={Joppe W. Bos and Marcelo E. Kaihara and T. Kleinjung and A. K. Lenstra and P. Montgomery}, journal={IACR Cryptol. ePrint Arch.}, year={2009}, volume={2009}, pages={389} }
Meeting the requirements of NIST’s new cryptographic standard ‘Suite B Cryptography’ means phasing out usage of 1024-bit RSA and 160-bit Elliptic Curve Cryptography (ECC) by the year 2010. This write-up comments on the vulnerability of these systems to an open community attack effort and aims to assess the risk of their continued usage beyond 2010. We conclude that for 1024-bit RSA the risk is small at least until the year 2014, and that 160-bit ECC may safely be used for much longer – with the… CONTINUE READING
Tables and Topics from this paper
Tables
87 Citations
Performance Analysis of RSA and Elliptic Curve Cryptography
- Computer Science
- Int. J. Netw. Secur.
- 2018
- 10
- PDF
A Lightweight Post-Quantum Lattice-Based RSA for Secure Communications
- Computer Science
- IEEE Access
- 2020
- 1
- PDF
Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols
- Computer Science
- Cryptogr.
- 2017
- 14
- PDF
References
SHOWING 1-10 OF 58 REFERENCES
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem
- Computer Science
- TRETS
- 2008
- 20
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2008
- 28
- PDF
Faster Attacks on Elliptic Curve Cryptosystems
- Mathematics, Computer Science
- Selected Areas in Cryptography
- 1998
- 187
- PDF
On Correlation Between the Order of S-boxes and the Strength of DES
- Mathematics, Computer Science
- EUROCRYPT
- 1994
- 254
- PDF
Improving the Time Complexity of Matsui's Linear Cryptanalysis
- Mathematics, Computer Science
- ICISC
- 2007
- 68
- Highly Influential
- PDF
On Probability of Success in Linear and Differential Cryptanalysis
- Computer Science, Mathematics
- Journal of Cryptology
- 2007
- 190
- PDF