Results 1 - 10
of
10,590
Table 6: Symmetric Key Cipher Support
"... In PAGE 5: ...Table 6: Symmetric Key Cipher Support Table6 presents an overview of the symmetric key cipher support in the servers we examined (here, the DES category includes 3-DES). As can be seen, nearly all the servers we surveyed support DES, RC2, and RC4.... ..."
Table 5: Symmetric Key MAC Support
"... In PAGE 5: ...Table 5: Symmetric Key MAC Support Table5 shows the MAC algorithm support discovered by PSST. Most servers we surveyed supported both.... ..."
Table 1. Public key and symmetric key operation overhead.
2003
"... In PAGE 7: ... The cryptography software packages, which we use, come with the development tools. As we see in Table1 , these security operations are fast. The longest operations are the public key operations, which take hundreds of milliseconds.... ..."
Cited by 16
Table 2: Comparable strengths Bits of security Symmetric key
2003
"... In PAGE 38: ... Additional Comments All NIST-recommended curves, key and modulus sizes must be tested to be used in a FIPS Approved mode of operation. For NIST-Recommended elliptic curves, the value of f is commonly considered to be the size of the private key ( Table2 , NIST SP 800-57). From this value the strength can be determined.... In PAGE 65: ...6.1, Comparable Algorithm Strength, contains Table2 , which provides comparable security strengths for the Approved algorithms. Table 2: Comparable strengths Bits of security Symmetric key ... In PAGE 65: ... A 256- bit AES key transport key could be used to wrap a 256-bit AES key. For key strengths not listed in Table2 above, the correspondence between the length of an RSA or a Diffie- Hellman key and the length of a symmetric key of an identical strength can be computed as: If the length of an RSA key L (this is the value of k in the fourth column of Table 2 above), then the length x of a symmetric key of approximately the same strength can be computed as: NIST CMVP Page 65 of 86 ... In PAGE 65: ... A 256- bit AES key transport key could be used to wrap a 256-bit AES key. For key strengths not listed in Table 2 above, the correspondence between the length of an RSA or a Diffie- Hellman key and the length of a symmetric key of an identical strength can be computed as: If the length of an RSA key L (this is the value of k in the fourth column of Table2 above), then the length x of a symmetric key of approximately the same strength can be computed as: NIST CMVP Page 65 of 86 ... ..."
Table 1. Comparison of implementation results for symmetric key cryptanalysis
2006
"... In PAGE 10: ... 8. Precomputation time for half of the salts and for all salts as a function of the number of BEE2 modules Table1 compares our results with other hardware as well as software solutions. The only known hardware solution is [12] which attacked one 40-bit DES while our target was 25 56-bit DES blocks.... ..."
Cited by 1
TABLE 4. Symmetric key cryptographic algorithms security and performance comparison values
TABLE 4. Symmetric key cryptographic algorithms security and performance comparison values
Table. 3. Performance of contemporary symmetric key encryption schemes.
TABLE II. TIME TO GENERATE SYMMETRIC CRYPTOGRAPHY KEYS
Table 2: Key Lengths With Similar Resistance to Brute-Force Attacks Symmetric Key Length Public Key Length
"... In PAGE 6: ... Knowing the key size is useless if you don apos;t know what type of algorithm is being used. But to give you some idea of what apos;s reasonable, Table2 , from [1], compares symmetric keys against one type of asymmetric key: those based on the \factoring problem quot; or the \discrete log problem. quot; (Algorithms based on the \elliptical curve discrete log problem quot; are more resistant to brute-force attacks and can use much smaller keys.... ..."
Results 1 - 10
of
10,590