This site would be a good place to start:

http://www.keylength.com/

Matt

On 6 March 2013 13:56, Ido Regev <ido.re...@ecitele.com> wrote:

>  We have a requirement from one of our customers regarding the encryption
> algorithms – "Make use of published public encryption algorithms that are
> considered to be practically unbroken. Contracting Authority considers an
> algorithm practically unbroken when a key can’t be recovered within 1 year
> with hardware costing less than 1,000,000 euro. We should have a life cycle
> process for the encryption algorithms in place to ensure the 1 year
> duration is kept despite the every increase computing power. Describe the
> process."****
>
> ** **
>
> We would greatly appreciate if you could help us with this question.****
>
> ** **
>
> Best regards,****
>
> Ido****
>
> This e-mail message is intended for the recipient only and contains
> information which is CONFIDENTIAL and which may be proprietary to ECI
> Telecom. If you have received this transmission in error, please inform us
> by e-mail, phone or fax, and then delete the original and all copies
> thereof.
>

Reply via email to