The aim of this article is to define the framework for the performance of an intrusion test from an external network (internet) into a private internal network. The aim is mostly to modify the image of such a test performed by a "well-informed handyman" and to realise the importance of such an operation in a contractual context.

In most cryptographic functions, key length is a substantial security parameter. Quite a few academic and official publications give recommendations and mathematical techniques to determine the minimum size of cryptographic keys while optimizing their security.

Although those publications are easily available, the choice of an appropriate key size remains complex as it depends on the reading and good understanding of the documents. allows you to determine the appropriate key length for a minimum security level through the implementation of the mathematical formulas with a summary of the information available in those publications. You can also easily compare the various methods.

Other news