This site would be a good place to start: http://www.keylength.com/
Matt On 6 March 2013 13:56, Ido Regev <ido.re...@ecitele.com> wrote: > We have a requirement from one of our customers regarding the encryption > algorithms – "Make use of published public encryption algorithms that are > considered to be practically unbroken. Contracting Authority considers an > algorithm practically unbroken when a key can’t be recovered within 1 year > with hardware costing less than 1,000,000 euro. We should have a life cycle > process for the encryption algorithms in place to ensure the 1 year > duration is kept despite the every increase computing power. Describe the > process."**** > > ** ** > > We would greatly appreciate if you could help us with this question.**** > > ** ** > > Best regards,**** > > Ido**** > > This e-mail message is intended for the recipient only and contains > information which is CONFIDENTIAL and which may be proprietary to ECI > Telecom. If you have received this transmission in error, please inform us > by e-mail, phone or fax, and then delete the original and all copies > thereof. >