Tools

Cryptographic Key Size Guide

NIST-aligned reference for recommended cryptographic key sizes by algorithm and security level. Covers RSA, EC, AES, ChaCha20 and hash functions with bits-of-security equivalents.

Bits of Security Reference
0 = Broken80 = Legacy112 = Minimum acceptable128 = Standard (current)192+ = High / long-term

Asymmetric (RSA / DSA / DH)

Security relies on the difficulty of factoring large numbers (RSA, DH) or discrete logarithm (DSA). Key sizes must be much larger than symmetric equivalents.

AlgorithmKey SizeBits of SecurityNIST StatusSafe UntilPFSNotes
RSA1024 bits80 (Legacy)DeprecatedAlready broken (NIST 2010)NoDo not use. Factoring 1024-bit RSA is feasible with nation-state resources.
RSA2048 bits112 (Minimum)Acceptable2030NoMinimum for TLS certificates. NIST allows through 2030. Plan migration to 3072+.
RSA3072 bits128 (Standard)Recommended2031+NoEquivalent security to AES-128. Recommended for new deployments beyond 2030.
RSA4096 bits140 (Standard)Recommended2040+NoHigher security margin, but significantly slower. Common for CA root keys.
DSA / DH1024-bit modulus80 (Legacy)DeprecatedAlready deprecatedNoNIST deprecated 1024-bit DSA after 2013.
DSA / DH2048-bit modulus112 (Minimum)Acceptable2030NoMinimum acceptable. DH requires careful parameter selection (avoid common moduli).
DSA / DH3072-bit modulus128 (Standard)Recommended2031+NoRecommended for new deployments. Use FFDHE groups from RFC 7919.

Elliptic Curve (EC)

EC cryptography achieves the same security with much smaller keys than RSA/DH. A 256-bit EC key is roughly equivalent to a 3072-bit RSA key.

AlgorithmKey SizeBits of SecurityNIST StatusSafe UntilPFSNotes
ECDSA / ECDHP-192 (192-bit)96 (Legacy)DeprecatedDeprecated 2015YesNo longer recommended by NIST. Migrate to P-256 or higher.
ECDSA / ECDHP-256 (256-bit)128 (Standard)Recommended2030+YesMost widely deployed EC curve. Equivalent to 3072-bit RSA. Used in TLS 1.3.
ECDSA / ECDHP-384 (384-bit)192 (High)Recommended2031+YesRequired for Suite B Top Secret. Good choice for long-lived certificates.
ECDSA / ECDHP-521 (521-bit)260 (Very High)RecommendedLong-termYesHighest NIST EC curve. Overkill for most uses but future-proof.
X25519 / Ed25519255-bit (Curve25519)128 (Standard)Recommended2030+YesModern, fast, and resistant to implementation errors. Preferred in TLS 1.3 and SSH.
X448 / Ed448448-bit (Curve448)224 (High)Recommended2031+YesHigher security variant of Curve25519. Less hardware support but well-studied.

Symmetric (AES / ChaCha20 / 3DES)

Symmetric ciphers use the same key for encryption and decryption. Quantum computers halve effective security (Grover's algorithm), so 256-bit AES is recommended.

AlgorithmKey SizeBits of SecurityNIST StatusSafe UntilPFSNotes
3DES (Triple DES)112-bit effective112 (Minimum)DeprecatedDisallowed after 2023 (NIST SP 800-131A)NoNIST disallowed 3DES as of 2023. Vulnerable to SWEET32. Replace with AES.
AES-128128 bits128 (Standard)Recommended2030+NoFast, well-studied. 128 bits is overkill for classical computers but quantum reduces to 64-bit effective.
AES-192192 bits192 (High)Recommended2031+NoRarely used in practice. AES-256 is preferred when higher security is needed.
AES-256256 bits256 (Very High)RecommendedLong-term (post-quantum)NoRecommended for post-quantum resistance (Grover reduces to 128-bit equivalent). Standard for new systems.
ChaCha20-Poly1305256 bits256 (Very High)RecommendedLong-termNoModern AEAD cipher. Preferred over AES-GCM when hardware AES acceleration is unavailable (mobile, IoT). Used in TLS 1.3.

Hash / MAC

Hashes must be at least twice the desired bits of security (collision resistance = outputSize/2). Use HMAC with any SHA-2/SHA-3 for message authentication.

AlgorithmKey SizeBits of SecurityNIST StatusSafe UntilPFSNotes
MD5128-bit outputN/A (Broken)DeprecatedBrokenNoCompletely broken for collision resistance. Never use for security. Only legacy compatibility.
SHA-1160-bit output60 (Insufficient)DeprecatedDeprecated 2016NoPractical collision attacks demonstrated (SHAttered, 2017). Disallowed by most CAs.
SHA-256256-bit output128 (Standard)Recommended2030+NoCurrent standard. Use HMAC-SHA256 for MACs. Vulnerable to length-extension when used as MAC(key||msg).
SHA-384 / SHA-512384/512-bit output192 (High)Recommended2031+NoHigher security margin. SHA-512 can be faster than SHA-256 on 64-bit systems.
SHA-3 (Keccak)256/384/512-bit output128 (Standard)Recommended2031+NoDifferent construction from SHA-2. Not vulnerable to length extension attacks. NIST standard since 2015.
References: NIST SP 800-57 Part 1 Rev. 5 (Key Management), NIST SP 800-131A Rev. 2 (Algorithm Transitions), NIST SP 800-186 (Elliptic Curves). Quantum security estimates based on NIST IR 8105.
Share

marduc812

2026