Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
456663 | Information Security Technical Report | 2010 | 7 Pages |
Abstract
After making the decision to use public-key cryptography, an organisation still has to make many important decisions before a practical system can be implemented. One of the more difficult challenges is to decide the length of the keys which are to be used within the system: longer keys provide more security but mean that the cryptographic operation will take more time to complete. The most common solution is to take advice from information security standards. This article will investigate the methodology that is used produce these standards and their meaning for an organisation who wishes to implement public-key cryptography.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Alexander W. Dent,