Research Article
Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach
Table 1
Security strength comparison of key size combinations for various cryptographic algorithms.
| Key size (bits) | Ratio | Security | Symmetric encryption algorithm | ECC | RSA/DH/DSA |
| 80 | Skipjack | 160–223 | 1024 | 1:6–30 | 112 | 3DES | 224–255 | 2048 | 128 | AES-128 | 256–383 | 3072 | 192 | AES-192 | 384–511 | 7680 | 256 | AES-256 | 512–more | 15360 |
|
|