• Mathematics, Computer Science
  • Published in
    IACR Cryptology ePrint…
    2009

On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography

@article{Bos2009OnTS,
  title={On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography},
  author={Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery},
  journal={IACR Cryptology ePrint Archive},
  year={2009},
  volume={2009},
  pages={389}
}
Meeting the requirements of NIST’s new cryptographic standard ‘Suite B Cryptography’ means phasing out usage of 1024-bit RSA and 160-bit Elliptic Curve Cryptography (ECC) by the year 2010. This write-up comments on the vulnerability of these systems to an open community attack effort and aims to assess the risk of their continued usage beyond 2010. We conclude that for 1024-bit RSA the risk is small at least until the year 2014, and that 160-bit ECC may safely be used for much longer – with the… CONTINUE READING

Tables and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 51 CITATIONS

Progress in Cryptology - LATINCRYPT 2014

  • Lecture Notes in Computer Science
  • 2014
VIEW 9 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Novel Non-interactive Deniable Authentication Protocol

Fei Shaoa, Houlei Wang
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2009
2019

CITATION STATISTICS

  • 2 Highly Influenced Citations

  • Averaged 5 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 24 REFERENCES

Heterogeneous Multi-core Processors, public lecture at EPFL

P. Hofstee
  • September 19,
  • 2008
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Selecting Cryptographic Key Sizes

  • Public Key Cryptography
  • 2000
VIEW 3 EXCERPTS

Another Attempt to Cope with 1024-bit, Eurocrypt 2007, LNCS 4515, pp

W. Geiselmann, R. Steinwandt, Non-Wafer-Scale Sieving Hardware for the NFS
  • 466–481
  • 2007

Osvik, A kilobit special number field sieve factorization, Asiacrypt

K.Aoki, J. Franke, T. Kleinjung, D.A.A.K. Lenstra
  • 2007
VIEW 2 EXCERPTS

The cutting edge of defense IT, Encrypting the future, Government Computer News, August 2007: http://www.gcn.com/print/26 20/44796-5.html

K. Hickey
  • 2007
VIEW 1 EXCERPT