Recommended Algorithms and Minimum Key Sizes

Years
Symmetric
Alg.
Hash
Alg.
HMAC
DSA,
D-H,
MQV
RSA
ECC
Present-
2015
TDES
AES-128
AES-192
AES-256
SHA-1
SHA-256
SHA-384
SHA-512
SHA-1 (80+ bit key)
SHA-256 (128+ bit key)
SHA-384 (192+ bit key)
SHA-512 (256+ bit key)
Min:
L=1024
N=160
Min:
k=1024
Min:
f=160
2016-
beyond
TDES
AES-128
AES-192
AES-256
SHA-256
SHA-384
SHA-512
SHA-256 (128+ bit key)
SHA-384 (192+ bit key)
SHA-512 (256+ bit key)
Min:
L=2048
N=224
Min:
k=2048
Min:
f=224


Equivalent Algorithm Strengths

Bits of Security
Symmetric
Cipher
Hash
Alg.
DSA, D-H, MQV
(discrete log systems)
RSA
ECC
80
 
SHA-1
L=1024
N=160
k=1024
f=160
112
TDES
 
L=2048
N=224
k=2048
f=224
128
AES-128
SHA-256
L=3072
N=256
k=3072
f=256
192
AES-192
SHA-384
L=7680
N=384
k=7680
f=384
256
AES-256
SHA-512
L=15360
N=512
k=15360
f=512

 

The data on this page is taken from NIST's Key Management Guidelines.


ISC Cryptographic Development Kit - User's Guide
ISC website
Questions? E-mail ISC technical support
Copyright© 2002-2006 Information Security Corp. All rights reserved.