Encryption key strengths

Encryption systems are often grouped into families of symmetric (single key) and asymmetric systems (a key to encrypt and another to decrypt). They also can be grouped according to the central algorithm used, such as elliptic curve cryptography. Here are some standard key sizes and the level of protection they provide.

Elliptic Curve
1,024-bit RSA
Ephemeral data, i.e. stock trades
 2,048-bit RSA*
E-commerce, Internet banking
 3,072-bit RSA*
 Classified to secret level
192, 256-bit
15,360-bit RSA
Highly sensitive, top secret

*80-bit keys are valid until 2010, according to the National Institute of Standards and Technology
*2,048-bit sufficient until 2030, according to RSA
*3,072-bit sufficient beyond 2030, according to RSA

Source: National Institute of Standards and Technology, RSA

About the Author

Rutrell Yasin is is a freelance technology writer for GCN.


  • senior center (vuqarali/Shutterstock.com)

    Bmore Responsive: Home-grown emergency response coordination

    Working with the local Code for America brigade, Baltimore’s Health Department built a new contact management system that saves hundreds of hours when checking in on senior care centers during emergencies.

  • man checking phone in the dark (Maridav/Shutterstock.com)

    AI-based ‘listening’ helps VA monitor vets’ mental health

    To better monitor veterans’ mental health, especially during the pandemic, the Department of Veterans Affairs is relying on data and artificial intelligence-based analytics.

Stay Connected