Skip to content

Instantly share code, notes, and snippets.

@nickscript0
Last active January 28, 2018 17:53
Show Gist options
  • Save nickscript0/9e85e7f94de8a05319f319e04d4161eb to your computer and use it in GitHub Desktop.
Save nickscript0/9e85e7f94de8a05319f319e04d4161eb to your computer and use it in GitHub Desktop.
Security level of modern encryption algorithms

Current estimates for bruteforcing modern encryption algorithms

Symmetric-key AES-256

Assumptions

Public-key

  • "...attacks against current public-key systems are always faster than brute-force search of the key space. Their security level isn't set at design time, but represents a computational hardness assumption, which is adjusted to match the best currently known attack" [ref]
  • The current RSA factorization record is for a 768-bit integer, announced in December 2009. It took four years and involved the smartest number theorists currently living on Earth. [ref]
  • For the RSA cryptosystem at 128-bit security level, NIST and ENISA recommend using 3072-bit keys and IETF 3253 bits. Elliptic curve cryptography requires shorter keys, so the recommendations are 256-383 (NIST), 256 (ENISA) and 242 bits (IETF). [ref]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment