Cryptographic Key Length Recommendations 2020-2030

2020

MethodDateSymmetricFactoring ModulusDiscrete KeyLogarithm GroupElliptic CurveHash
Lenstra / Verheul20208618811511881161171
Lenstra Updated20208213871631387163163
ECRYPT2018-202812830722563072256256
NIST2019-203011220482242048224224
ANSSI2014-202010020482002048200200
NSA-2563072--384384
BSI2020-202212820002502000250256

2030

MethodDateSymmetricFactoring ModulusDiscrete KeyLogarithm GroupElliptic CurveHash
Lenstra / Verhuel20309324931652493176186
Lenstra Updated20308816981761698176176
ECRYPT2029-20682561536051215360512512
NIST2019-203011220482242048224224
ANSI>203012830722003072256256
NSA-2563072--384384

Related Articles

OpenSSL Commands

SSL or Secure Sockets Layer is a legacy cryptographic protocol that offers end to end encryption. It acts to provides a level of data integrity and privacy during network communication.

What is SSL?

SSL or Secure Sockets Layer is a legacy cryptographic protocol that offers end to end encryption. It acts to provides a level of data integrity and privacy during network communication.

Secure Data Wiping & Destruction

Data wiping is an important part of a businesses information security program. For those in compliance with federal regulations and have a Written Information Security Program (WISP) it likely includes the procedures and processes for data wiping and scrubbing of files, directories, partitions and storage devices. Personally Identifiable Information (PII) is most often stored on digital media. Payment Card Information (PCI) is also likely to be stored on your drives. Due to the sensitive nature of this data one must destroy storage media properly. They must do so to be in compliance with federal and state laws. While the law mandates the proper destruction of data storage devices it is left unclear as to what constitutes “proper”. This article attempts to define a process that meets and exceeds what is expected by regulators.

FTC June 2015 Guidance on Data Security

Make reasonable choices based on the nature of the business and the sensitivity of the information involved; Keep only what you need for your business; Protect what you keep; Properly dispose of what you no longer need;
Create a plan to respond to security incidents.