Back to Results
First PageMeta Content
Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard


Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of
Add to Reading List

Document Date: 2001-08-05 13:50:14


Open Document

File Size: 142,50 KB

Share Result on Facebook

City

Chicago / /

Company

IBM / RSA Data Security Inc. / AT&T / Sun Microsystems / Counterpane Systems / Access Data Inc. / AccessData Corporation / MIT Laboratory / /

Country

United States / /

Currency

cent / USD / /

/

Facility

Massachusetts Institute of Technology / MIT's Laboratory / /

IndustryTerm

keys using networks / commission custom chips / average solution / public-key systems / much hardware / asymmetric systems / symmetric cryptographic systems / symmetric systems / employed encryption algorithm / large-scale trust management / computer central processor / computer chips / technology spectrum / cryptographic algorithm / the-shelf technology / programmable hardware / conventional processors / cryptanalytic technologies / brute-force key search / cryptographic systems / software security tools / individual product / technology permits / cryptographic equipment / search engines / cost-e ective technology / computer software / encryption algorithms / computer accessory device / ancillary equipment / computing / exportable mass market software / encryption algorithm / search time / electronic commerce / /

Organization

MIT's Laboratory for Computer Science / Ecole Polytechnique in Paris / MIT / U.S. Government / Massachusetts Institute of Technology / Federal Bureau of Investigation / ASIC / ASIC Intelligence Agency / San Diego Supercomputer Center / Virtually No Protection Current U.S. Government / /

Person

Eric Thompson / Martin Hellman / Leonard Adleman / Ron Rivest / Ronald L. Rivest / Kevin Mitnick / Tsutomu Shimomura / Bruce Schneier / Michael Wiener / /

Position

cryptographic advisor / president / author / distinguished Engineer / spy / senior research scientist / Director / representative / one of the founders / professor of computer science / frequent lecturer / computational physicist / /

ProgrammingLanguage

Hoc / /

ProvinceOrState

Massachusetts / /

Technology

FPGA / RC4 algorithm / FPGA chip / image compression / encryption algorithms / 1.2 Encryption / cryptanalytic technologies / encryption algorithm / the-shelf technology / DES algorithm / data encryption / smart card / above / 40-bit encryption / integrated circuits / FPGA technology / cryptographic algorithm / Encryption / 1996 ABSTRACT Encryption / cryptography / ASIC / computer chips / 10 chip / 1 2 1 Encryption / computer central processor / public key / T ORCA chip / RC4 algorithms / 40bit RC4 algorithm / cost-e ective technology / Clipper Chip / computer encryption / encryption system / strongest encryption / drug design / 40-bit encryption / 25 ORCA chips / employed encryption algorithm / /

SocialTag