@@ -16,9 +16,9 @@ <h2>Why is this an issue?</h2>
16
16
< p > Note that depending on the algorithm, the term < strong > key</ strong > refers to a different mathematical property. For example:</ p >
17
17
< ul >
18
18
< li > For RSA, the key is the product of two large prime numbers, also called the < strong > modulus</ strong > . </ li >
19
- < li > For AES and Elliptic Curve Cryptography (ECC), the key is only a sequence of randomly generated bytes.
19
+ < li > For Elliptic Curve Cryptography (ECC), the key is only a sequence of randomly generated bytes.
20
20
< ul >
21
- < li > In some cases, AES keys are derived from a master key or a passphrase using a Key Derivation Function (KDF) like PBKDF2 (Password-Based Key
21
+ < li > In some cases, keys are derived from a master key or a passphrase using a Key Derivation Function (KDF) like PBKDF2 (Password-Based Key
22
22
Derivation Function 2) </ li >
23
23
</ ul > </ li >
24
24
</ ul >
@@ -139,11 +139,6 @@ <h4>RSA (Rivest-Shamir-Adleman) and DSA (Digital Signature Algorithm)</h4>
139
139
< p > The security of these algorithms depends on the difficulty of attacks attempting to solve their underlying mathematical problem.</ p >
140
140
< p > In general, a minimum key size of < strong > 2048</ strong > bits is recommended for both. It provides 112 bits of security. A key length of
141
141
< strong > 3072</ strong > or < strong > 4096</ strong > should be preferred when possible.</ p >
142
- < h4 > AES (Advanced Encryption Standard)</ h4 >
143
- < p > AES supports three key sizes: 128 bits, 192 bits and 256 bits. The security of the AES algorithm is based on the computational complexity of trying
144
- all possible keys.< br > A larger key size increases the number of possible keys and makes exhaustive search attacks computationally infeasible.
145
- Therefore, a 256-bit key provides a higher level of security than a 128-bit or 192-bit key.</ p >
146
- < p > Currently, a minimum key size of < strong > 128 bits</ strong > is recommended for AES.</ p >
147
142
< h4 > Elliptic Curve Cryptography (ECC)</ h4 >
148
143
< p > Elliptic curve cryptography is also used in various algorithms, such as ECDSA, ECDH, or ECMQV. The length of keys generated with elliptic curve
149
144
algorithms is mentioned directly in their names. For example, < code > secp256k1</ code > generates a 256-bits long private key.</ p >
0 commit comments