Encryption key strengths

Encryption systems are often grouped into families of symmetric (single key) and asymmetric systems (a key to encrypt and another to decrypt). They also can be grouped according to the central algorithm used, such as elliptic curve cryptography. Here are some standard key sizes and the level of protection they provide.

Elliptic Curve
1,024-bit RSA
Ephemeral data, i.e. stock trades
 2,048-bit RSA*
E-commerce, Internet banking
 3,072-bit RSA*
 Classified to secret level
192, 256-bit
15,360-bit RSA
Highly sensitive, top secret

*80-bit keys are valid until 2010, according to the National Institute of Standards and Technology
*2,048-bit sufficient until 2030, according to RSA
*3,072-bit sufficient beyond 2030, according to RSA

Source: National Institute of Standards and Technology, RSA

About the Author

Rutrell Yasin is is a freelance technology writer for GCN.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.