O'Reilly logo

Mastering Internet of Things by Peter Waher

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding key sizes

When using different algorithms, it might be difficult to evaluate the relative strengths of each, since the key sizes vary (counted in bits). The NSA has made some recommendations for commercial enterprises on the relative strengths of different methods. These can be used as a guideline for how secure the corresponding cipher is, or how "easy" it is to break it (for, or according to, the NSA). They can therefore be considered comparatively of similar strength.

Algorithm

Key size

Usage

RSA

3072

Keys, signatures

Diffie-Hellman

3072

Key exchange

Elliptic Curve

NIST P-384

Key exchange, signatures

SHA

384

Integrity

AES

256

Confidentiality

You can find the NSA recommendations ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required