17

What is the key size that RSA and Diffie-Hellman are using now that can guarantee secure communication over Internet and will not be able to break by the best available algorithms (NFS & FFS or any others) in feasible time?

Zombo
  • 1
  • 3
Tanmay Sharma
  • 193
  • 1
  • 1
  • 6

2 Answers2

21

A good overview on that matter can always be found on https://keylength.com, which summarises many publications with recommendations for key lengths. Especially NIST SP-800-38 yields good data for your question.

For 112 bit security (which is about the minimum you should use for not extremely important things) you currently (2016) have to use RSA-2048 keys, 2048 bit DH groups or 224 bit elliptic curves.

mat
  • 2,558
  • 1
  • 14
  • 28
21

Currently (as of 2017-05-11) 2048-bit keys are most popular for use with RSA, and 2048 bit keys should also be used with classic Diffie-Hellman. These offer about the same security as a symmetric encryption algorithm with 112 bits of security.

Also in common use as of this date are 256 bit Elliptic Curve keys (mostly NIST P-256 and Curve25519) for ECDH/ECDSA/EdDSA which offer the same security as a 128-bit symmetric algorithm.

A good primer on the reasons for these key size differences can be found here.

rmalayter
  • 2,297
  • 17
  • 24