Академический Документы
Профессиональный Документы
Культура Документы
How long should a key be used before it is replaced? Search the Internet
for information regarding crypto-periods for hash, symmetric, and asymmet-
ric algorithms. Find at least three sources for each of the algorithms. Draw a
table that lists the algorithms and the recommended time, and then calculate
the average for each. Do you agree or disagree? What would be your recom-
mendation on crypto-periods for each? Why?
https://
www.keylength.com/
en/4/
https://csrc.nist.gov/
Projects/Key-Manage-
ment
The cryptoperiods suggested are only rough guidelines; longer or shorter cryptope-
riods may be warranted, depending on the application and environment in which
the keys will be used. However, when assigning a longer cryptoperiod than that
suggested below, serious consideration should be given to the risks associated with
doing so. Shorter is always better even though it might not be easier to apply. I
would recommend the shortest time for each cryptoperiod because of the risks as-
sociated with longer periods.